Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2024:3622 - Bug Fix Advisory
Issued:
2024-06-05
Updated:
2024-06-05

RHBA-2024:3622 - Bug Fix Advisory

  • Overview
  • Updated Images

Synopsis

updated Red Hat Enterprise Linux 8 container images

Type/Severity

Bug Fix Advisory

Topic

Updated Red Hat Enterprise Linux 8 container images are now available

Description

The Red Hat Enterprise Linux 8 container images have been updated to address the following security advisory: RHSA-2024:3618 (see References)

Users of Red Hat Enterprise Linux 8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.

You can find images updated by this advisory in Red Hat Container Catalog (see References).

Solution

The Red Hat Enterprise Linux 8 container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).

Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2250843 - CVE-2023-6240 kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation
  • BZ - 2257406 - CVE-2024-0340 kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
  • BZ - 2263875 - CVE-2024-25744 kernel: untrusted VMM can trigger int80 syscall handling
  • BZ - 2265271 - CVE-2023-52439 kernel: uio: Fix use-after-free in uio_open
  • BZ - 2265646 - CVE-2024-26593 kernel: i2c: i801: Fix block process call transactions
  • BZ - 2265654 - CVE-2023-52445 kernel: pvrusb2: fix use after free on context disconnection
  • BZ - 2265833 - CVE-2024-26603 kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever
  • BZ - 2266296 - CVE-2019-25162 kernel: use after free in i2c
  • BZ - 2266446 - CVE-2021-46934 kernel: i2c: validate user data in compat ioctl
  • BZ - 2266746 - CVE-2020-36777 kernel: media: dvbdev: Fix memory leak in dvb_media_device_free()
  • BZ - 2266841 - CVE-2021-47013 kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
  • BZ - 2267038 - CVE-2023-52477 kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
  • BZ - 2267185 - CVE-2021-47055 kernel: mtd: require write permissions for locking and badblock ioctls
  • BZ - 2267355 - CVE-2024-26615 kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump
  • BZ - 2267509 - CVE-2022-48627 kernel: vt: fix memory overlapping when deleting chars in the buffer
  • BZ - 2267705 - CVE-2024-23307 kernel: Integer Overflow in raid5_cache_count
  • BZ - 2267724 - CVE-2023-52565 kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()
  • BZ - 2267758 - CVE-2023-52578 kernel: net: bridge: data races indata-races in br_handle_frame_finish()
  • BZ - 2267789 - CVE-2023-52528 kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
  • BZ - 2267797 - CVE-2023-52520 kernel: platform/x86: think-lmi: Fix reference leak
  • BZ - 2267804 - CVE-2023-52513 kernel: RDMA/siw: Fix connection failure handling
  • BZ - 2268291 - CVE-2023-52607 kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
  • BZ - 2268293 - CVE-2023-52606 kernel: powerpc/lib: Validate size for vector operations
  • BZ - 2268309 - CVE-2023-52598 kernel: s390/ptrace: handle setting of fpc register correctly
  • BZ - 2268315 - CVE-2023-52595 kernel: wifi: rt2x00: restart beacon queue when hardware reset
  • BZ - 2268317 - CVE-2023-52594 kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
  • BZ - 2269213 - CVE-2024-26610 kernel: wifi: iwlwifi: fix a memory corruption
  • BZ - 2269856 - CVE-2021-47118 kernel: pid: take a reference when initializing `cad_pid`
  • BZ - 2270080 - CVE-2023-52610 kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
  • BZ - 2270879 - CVE-2024-26643 kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout
  • BZ - 2270881 - CVE-2024-26642 kernel: netfilter: nf_tables: disallow anonymous set with timeout flag
  • BZ - 2271469 - CVE-2021-47171 kernel: net: usb: fix memory leak in smsc75xx_bind
  • BZ - 2271476 - CVE-2021-47153 kernel: i2c: i801: Don't generate an interrupt on bus reset
  • BZ - 2272780 - CVE-2024-26659 kernel: xhci: handle isoc Babble and Buffer Overrun events properly
  • BZ - 2272791 - CVE-2024-26664 kernel: hwmon: (coretemp) Fix out-of-bounds memory access
  • BZ - 2273092 - CVE-2024-26694 kernel: wifi: iwlwifi: fix double-free bug
  • BZ - 2273094 - CVE-2024-26693 kernel: wifi: iwlwifi: mvm: fix a crash when we run out of stations
  • BZ - 2273223 - CVE-2024-26779 kernel: wifi: mac80211: fix race condition on enabling fast-xmit
  • BZ - 2273260 - CVE-2024-26744 kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
  • BZ - 2273262 - CVE-2024-26743 kernel: RDMA/qedr: Fix qedr_create_user_qp error flow
  • BZ - 2274624 - CVE-2021-47185 kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
  • BZ - 2275645 - CVE-2024-26901 kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
  • BZ - 2275655 - CVE-2024-26897 kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete
  • BZ - 2275666 - CVE-2024-26892 kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq()
  • BZ - 2275707 - CVE-2024-26872 kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup
  • BZ - 2275777 - CVE-2024-26919 kernel: usb: ulpi: Fix debugfs directory leak
  • BZ - 2278169 - CVE-2024-26964 kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma
  • BZ - 2278237 - CVE-2024-26934 kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
  • BZ - 2278240 - CVE-2024-26933 kernel: USB: core: Fix deadlock in port "disable" sysfs attribute
  • BZ - 2278268 - CVE-2024-27014 kernel: net/mlx5e: Prevent deadlock while disabling aRFS
  • BZ - 2278314 - CVE-2024-26993 kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
  • BZ - 2278356 - CVE-2024-26973 kernel: fat: fix uninitialized field in nostale filehandles
  • BZ - 2278398 - CVE-2024-27059 kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
  • BZ - 2278409 - CVE-2024-27056 kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists
  • BZ - 2278417 - CVE-2024-27052 kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work
  • BZ - 2278431 - CVE-2024-27048 kernel: wifi: brcm80211: handle pmk_op allocation failure
  • BZ - 2278537 - CVE-2022-48669 kernel: powerpc/pseries: Fix potential memleak in papr_get_attr()
  • RHEL-35576 - Backport fix for BPF self-test: pyperf180.c in 8.10.z

CVEs

  • CVE-2019-25162
  • CVE-2020-36777
  • CVE-2021-46934
  • CVE-2021-47013
  • CVE-2021-47055
  • CVE-2021-47118
  • CVE-2021-47153
  • CVE-2021-47171
  • CVE-2021-47185
  • CVE-2022-48627
  • CVE-2022-48669
  • CVE-2023-6240
  • CVE-2023-52439
  • CVE-2023-52445
  • CVE-2023-52477
  • CVE-2023-52513
  • CVE-2023-52520
  • CVE-2023-52528
  • CVE-2023-52565
  • CVE-2023-52578
  • CVE-2023-52594
  • CVE-2023-52595
  • CVE-2023-52598
  • CVE-2023-52606
  • CVE-2023-52607
  • CVE-2023-52610
  • CVE-2024-0340
  • CVE-2024-23307
  • CVE-2024-25744
  • CVE-2024-26593
  • CVE-2024-26603
  • CVE-2024-26610
  • CVE-2024-26615
  • CVE-2024-26642
  • CVE-2024-26643
  • CVE-2024-26659
  • CVE-2024-26664
  • CVE-2024-26693
  • CVE-2024-26694
  • CVE-2024-26743
  • CVE-2024-26744
  • CVE-2024-26779
  • CVE-2024-26872
  • CVE-2024-26892
  • CVE-2024-26897
  • CVE-2024-26901
  • CVE-2024-26919
  • CVE-2024-26933
  • CVE-2024-26934
  • CVE-2024-26964
  • CVE-2024-26973
  • CVE-2024-26993
  • CVE-2024-27014
  • CVE-2024-27048
  • CVE-2024-27052
  • CVE-2024-27056
  • CVE-2024-27059

References

  • https://access.redhat.com/errata/RHSA-2024:3618
  • https://access.redhat.com/containers

aarch64

ubi8/nodejs-18@sha256:51bcff97861fcf86bf858484d7157a26d5880ae37c09d080b4f4a1278fdcaf11
rhel8/nodejs-18@sha256:51bcff97861fcf86bf858484d7157a26d5880ae37c09d080b4f4a1278fdcaf11
rhel8/nodejs-20@sha256:d2008ae9eb6eacd3818de8a890d4859cb161ef83655c76c67d9e66daf5a644c9
ubi8/nodejs-20@sha256:d2008ae9eb6eacd3818de8a890d4859cb161ef83655c76c67d9e66daf5a644c9
rhel8/perl-526@sha256:a7f6633f202c953f558705068eb6e4c685c70847609aa9e35740f654608fe0a7
ubi8/perl-526@sha256:a7f6633f202c953f558705068eb6e4c685c70847609aa9e35740f654608fe0a7
rhel8/perl-532@sha256:38f3d6583fa3a3b79828483c85f9e46f576fab2c19e1c8cbcc12b68f9dbc153e
ubi8/perl-532@sha256:38f3d6583fa3a3b79828483c85f9e46f576fab2c19e1c8cbcc12b68f9dbc153e
rhel8/php-74@sha256:2a98985453e03ea26b5304ca250f41c996d019751382ba184ced70e616e08e72
ubi8/php-74@sha256:2a98985453e03ea26b5304ca250f41c996d019751382ba184ced70e616e08e72
ubi8/php-80@sha256:f4d24dc05fe04f32a50486cff62ec67a6ad9eda4ad514a5211b65a8d1e95dac1
rhel8/php-80@sha256:f4d24dc05fe04f32a50486cff62ec67a6ad9eda4ad514a5211b65a8d1e95dac1
ubi8/php-82@sha256:eaee91b1c143e04722a04428674459b9bd68740567465ec2cfff3fb0c147fc2b
rhel8/php-82@sha256:eaee91b1c143e04722a04428674459b9bd68740567465ec2cfff3fb0c147fc2b
rhel8/python-27@sha256:3a87d7ee43618f96fdaaf544d73bb2bff3defdd3455288bf44585b91e7f139c7
ubi8/python-27@sha256:3a87d7ee43618f96fdaaf544d73bb2bff3defdd3455288bf44585b91e7f139c7
rhel8/python-311@sha256:2ecd08fea05bcf1b80be45f4f6745b6c23565537e976f2762847e70c789cfe4f
ubi8/python-311@sha256:2ecd08fea05bcf1b80be45f4f6745b6c23565537e976f2762847e70c789cfe4f
rhel8/python-312@sha256:8bda6d271033e24025bd9303f011b0ed166e23f78eb57a3c892d720793347c75
ubi8/python-312@sha256:8bda6d271033e24025bd9303f011b0ed166e23f78eb57a3c892d720793347c75
rhel8/python-36@sha256:5e069685ffa7a5957b0d1c75c72080f057a939def17dcf1fec83a81e9ce60e66
ubi8/python-36@sha256:5e069685ffa7a5957b0d1c75c72080f057a939def17dcf1fec83a81e9ce60e66
ubi8/python-39@sha256:06e883d217d9322c90c23945af3fc951661357dac6acde937e25e4e7cb5ecd14
rhel8/python-39@sha256:06e883d217d9322c90c23945af3fc951661357dac6acde937e25e4e7cb5ecd14
ubi8/ruby-25@sha256:8b8d28fead1f39bb3e452b6ef5af6c9ecc5a90e4b5959f1190a638f0ea1cb6cb
rhel8/ruby-25@sha256:8b8d28fead1f39bb3e452b6ef5af6c9ecc5a90e4b5959f1190a638f0ea1cb6cb
ubi8/ruby-30@sha256:e586c63cb314955046ff44494b2868e8c57ca27ed8fad7297bc3624d61c24164
rhel8/ruby-30@sha256:e586c63cb314955046ff44494b2868e8c57ca27ed8fad7297bc3624d61c24164
ubi8/ruby-31@sha256:70ba779319a384c65f4e9bb2b6bbfb13eb64a17b5492ec69b6df1926cc132832
rhel8/ruby-31@sha256:70ba779319a384c65f4e9bb2b6bbfb13eb64a17b5492ec69b6df1926cc132832
rhel8/ruby-33@sha256:181ae64ea21c5a6bb86bc736390ba795c12e4ac88a00aeb2328cad406e512a64
ubi8/ruby-33@sha256:181ae64ea21c5a6bb86bc736390ba795c12e4ac88a00aeb2328cad406e512a64
rhel8/s2i-base@sha256:8de07c2ed4b6ce63c08f026d82d7aba9c6afd147d2535c40dbf2e6312296896d
ubi8/s2i-base@sha256:8de07c2ed4b6ce63c08f026d82d7aba9c6afd147d2535c40dbf2e6312296896d
rhel8/varnish-6@sha256:82d69a6b84e44eeab23f947a1e522ba6419663423851c04bdf2bc2a0ca31fc4d

ppc64le

ubi8/nodejs-18@sha256:1cb6152277048163428d9824ad40291668b4bd9680885ca6d277f97e4219dd30
rhel8/nodejs-18@sha256:1cb6152277048163428d9824ad40291668b4bd9680885ca6d277f97e4219dd30
rhel8/nodejs-20@sha256:33d447bf409250201bce78c4e699f311ac4f90482fc5ee8394c2753d0efa7c4b
ubi8/nodejs-20@sha256:33d447bf409250201bce78c4e699f311ac4f90482fc5ee8394c2753d0efa7c4b
rhel8/perl-526@sha256:72d57cd9b1722a9cd01f6ce1bbf711b25f2996842c16dbb2c94446af91468e2a
ubi8/perl-526@sha256:72d57cd9b1722a9cd01f6ce1bbf711b25f2996842c16dbb2c94446af91468e2a
rhel8/perl-532@sha256:c28b19c697a2688c1d62b0d94202b258b66255a94f011b8a2564987990cbc256
ubi8/perl-532@sha256:c28b19c697a2688c1d62b0d94202b258b66255a94f011b8a2564987990cbc256
rhel8/php-74@sha256:50dbf63f6a8a0ee4fa1a0dbcfcc06e43acc9cf6ed0eec9c135e81f2f2011ddd0
ubi8/php-74@sha256:50dbf63f6a8a0ee4fa1a0dbcfcc06e43acc9cf6ed0eec9c135e81f2f2011ddd0
ubi8/php-80@sha256:71c7e9860c2506160b59cc35f44078a3a48fa286227509ea0468d2c24910869a
rhel8/php-80@sha256:71c7e9860c2506160b59cc35f44078a3a48fa286227509ea0468d2c24910869a
ubi8/php-82@sha256:dfe78d21b41eab7859f8b818aecd3d1ddd60aa3d837de4867b07ae1b0b4aab5b
rhel8/php-82@sha256:dfe78d21b41eab7859f8b818aecd3d1ddd60aa3d837de4867b07ae1b0b4aab5b
rhel8/python-27@sha256:bd4616a36aed7bc2961cdcf116f9de276ca0198dc0b5c2e7701d6c71d9b2bc70
ubi8/python-27@sha256:bd4616a36aed7bc2961cdcf116f9de276ca0198dc0b5c2e7701d6c71d9b2bc70
rhel8/python-311@sha256:7b4d6e8ba718838b258a376f119c33d383c3c9afe412fae06240304c4616ca0c
ubi8/python-311@sha256:7b4d6e8ba718838b258a376f119c33d383c3c9afe412fae06240304c4616ca0c
rhel8/python-312@sha256:942644eb93ec083e827a9fe9dc93a09544b26414ed4cdaef2937d7e3ca8c7c56
ubi8/python-312@sha256:942644eb93ec083e827a9fe9dc93a09544b26414ed4cdaef2937d7e3ca8c7c56
rhel8/python-36@sha256:b97dcba939724c653eb78ec4c6aecaab4c300cd8dc708e65bcc61f112b2a6396
ubi8/python-36@sha256:b97dcba939724c653eb78ec4c6aecaab4c300cd8dc708e65bcc61f112b2a6396
ubi8/python-39@sha256:50c4b11c39294b27a955bfffb779519f22d53f143960f4262a6cd214a5da5f12
rhel8/python-39@sha256:50c4b11c39294b27a955bfffb779519f22d53f143960f4262a6cd214a5da5f12
ubi8/ruby-25@sha256:0fe4a0967b2b6ac5c92df00554a71b014ae10d252bbf72c3eb263489557b1770
rhel8/ruby-25@sha256:0fe4a0967b2b6ac5c92df00554a71b014ae10d252bbf72c3eb263489557b1770
ubi8/ruby-30@sha256:7e84c49d9068b7a068c08225ab214a81a657ba1c0f0474ae5a6c325e7f16d410
rhel8/ruby-30@sha256:7e84c49d9068b7a068c08225ab214a81a657ba1c0f0474ae5a6c325e7f16d410
ubi8/ruby-31@sha256:626e285084b68d3f8141361d5b0145d1d76f069e7f6426f055f72257239df56e
rhel8/ruby-31@sha256:626e285084b68d3f8141361d5b0145d1d76f069e7f6426f055f72257239df56e
rhel8/ruby-33@sha256:2ff43c1ee2b2401d0f145520df0097f9ef104e9d0d259e75a77be0aeaed67498
ubi8/ruby-33@sha256:2ff43c1ee2b2401d0f145520df0097f9ef104e9d0d259e75a77be0aeaed67498
rhel8/s2i-base@sha256:f0d64b186a2ba1cfd6721e147d8dfe03b03def688d9627da07186903c0a94921
ubi8/s2i-base@sha256:f0d64b186a2ba1cfd6721e147d8dfe03b03def688d9627da07186903c0a94921
rhel8/varnish-6@sha256:6743567efc599939e6f47715c4a4492183aaf80714e3f651082c90c00ebd1ed7

s390x

ubi8/nodejs-18@sha256:ef5fe8a7f89280b3edb7cb0c15096b48b10cb7f574af8a9c927695eaa4f01b4c
rhel8/nodejs-18@sha256:ef5fe8a7f89280b3edb7cb0c15096b48b10cb7f574af8a9c927695eaa4f01b4c
rhel8/nodejs-20@sha256:4783bab409de19a61c22af215e7233657e62305ca3b64b1b030ebd90d8d0d21f
ubi8/nodejs-20@sha256:4783bab409de19a61c22af215e7233657e62305ca3b64b1b030ebd90d8d0d21f
rhel8/perl-526@sha256:e0371b2722ab64fd974f61b31d63d38e3e41694c261d4b0f57c675f51eef8316
ubi8/perl-526@sha256:e0371b2722ab64fd974f61b31d63d38e3e41694c261d4b0f57c675f51eef8316
rhel8/perl-532@sha256:ada952ce4555aca9e56003b935901708bbca3514dde6fade0de90b623dabf984
ubi8/perl-532@sha256:ada952ce4555aca9e56003b935901708bbca3514dde6fade0de90b623dabf984
rhel8/php-74@sha256:462423bfa09856c2e30c45eac51f3cb1244096c87316a299dfe3fdae35d12fab
ubi8/php-74@sha256:462423bfa09856c2e30c45eac51f3cb1244096c87316a299dfe3fdae35d12fab
ubi8/php-80@sha256:9fe401a89f0fda4c339e25a4c71a6e7b02e126e6f091d44ebbd050cba6348eac
rhel8/php-80@sha256:9fe401a89f0fda4c339e25a4c71a6e7b02e126e6f091d44ebbd050cba6348eac
ubi8/php-82@sha256:4a24daa019d62688779543044988a114502b23453649bf95ca276a4540f4a901
rhel8/php-82@sha256:4a24daa019d62688779543044988a114502b23453649bf95ca276a4540f4a901
rhel8/python-27@sha256:57f7b7018e1f8f09271eb3a4fd385119762114bc746c7caba64765953af70b7a
ubi8/python-27@sha256:57f7b7018e1f8f09271eb3a4fd385119762114bc746c7caba64765953af70b7a
rhel8/python-311@sha256:4fcc8d3ebb7baaf390ec1272265eb25d74ca4233d079a03637c727b0ce7239c7
ubi8/python-311@sha256:4fcc8d3ebb7baaf390ec1272265eb25d74ca4233d079a03637c727b0ce7239c7
rhel8/python-312@sha256:25c4207ff35d6cb77d3ae887d7d1a646de58b4f038c4b3ed1f8a88eb458bf2a9
ubi8/python-312@sha256:25c4207ff35d6cb77d3ae887d7d1a646de58b4f038c4b3ed1f8a88eb458bf2a9
rhel8/python-36@sha256:e3013808daf8ef943ed9cc6105b5730db97b6dc39f38892e45b6bdf4f237d46a
ubi8/python-36@sha256:e3013808daf8ef943ed9cc6105b5730db97b6dc39f38892e45b6bdf4f237d46a
ubi8/python-39@sha256:4f25b1082e62696091e2e4dcc49ab78e555a2adf52bd0e8a9048afa18f17ae9d
rhel8/python-39@sha256:4f25b1082e62696091e2e4dcc49ab78e555a2adf52bd0e8a9048afa18f17ae9d
ubi8/ruby-25@sha256:d17e28dbc3c7fe447040af85e1b7a09ee75005aaabf4b4fc29f09fb4aad42f81
rhel8/ruby-25@sha256:d17e28dbc3c7fe447040af85e1b7a09ee75005aaabf4b4fc29f09fb4aad42f81
ubi8/ruby-30@sha256:f7d41fe4aad88a4cc79ea11996697dfddf90a9e446819301070046353f926db5
rhel8/ruby-30@sha256:f7d41fe4aad88a4cc79ea11996697dfddf90a9e446819301070046353f926db5
ubi8/ruby-31@sha256:e43eccfd87066302434628e7cffd0eb5c09cf4833a35ffc0636f6f7523f43a35
rhel8/ruby-31@sha256:e43eccfd87066302434628e7cffd0eb5c09cf4833a35ffc0636f6f7523f43a35
rhel8/ruby-33@sha256:bc012a4c9837976877233a2e484ab0d7c5f7ab4508c662cfa9b52bd6efddd5e6
ubi8/ruby-33@sha256:bc012a4c9837976877233a2e484ab0d7c5f7ab4508c662cfa9b52bd6efddd5e6
rhel8/s2i-base@sha256:9df0473bfe30ea1910cbf869a9c217815dacac78ec353f62f8781ef55998a05f
ubi8/s2i-base@sha256:9df0473bfe30ea1910cbf869a9c217815dacac78ec353f62f8781ef55998a05f
rhel8/varnish-6@sha256:1d6c09c0a9871d0d84e4006f4e4eeb062fac7f401a2ea8e9100e91d4af120d18

x86_64

ubi8/nodejs-18@sha256:8912271ecdc0ff8819f89124264b4512338a4b4b0dbb8d4c00d6089739c6a021
rhel8/nodejs-18@sha256:8912271ecdc0ff8819f89124264b4512338a4b4b0dbb8d4c00d6089739c6a021
rhel8/nodejs-20@sha256:2d00048fac3568d1cd8387347a02dcee6f72b06b93b1ff0de08be0b04aa50de2
ubi8/nodejs-20@sha256:2d00048fac3568d1cd8387347a02dcee6f72b06b93b1ff0de08be0b04aa50de2
rhel8/perl-526@sha256:2082d194d281e49d8ca0e230134683ead4cbf8ec6e400f6bbf3ef20032dfbb10
ubi8/perl-526@sha256:2082d194d281e49d8ca0e230134683ead4cbf8ec6e400f6bbf3ef20032dfbb10
rhel8/perl-532@sha256:46b2d3b1d5e1c420a56d1f47738fb8d8650832cf9fa60143dbd2866b5ca06a47
ubi8/perl-532@sha256:46b2d3b1d5e1c420a56d1f47738fb8d8650832cf9fa60143dbd2866b5ca06a47
rhel8/php-74@sha256:16562ccd210cf4626f8c0b080004414fa271c055b1793f26a1e4e1a4fb6b6443
ubi8/php-74@sha256:16562ccd210cf4626f8c0b080004414fa271c055b1793f26a1e4e1a4fb6b6443
ubi8/php-80@sha256:425b282788b0a70821e5ce1ffa1b9e2538480a402a542db87c72530687e57a9f
rhel8/php-80@sha256:425b282788b0a70821e5ce1ffa1b9e2538480a402a542db87c72530687e57a9f
ubi8/php-82@sha256:e95ec0154f7fb1d1cb0f20ba4e44d5680c00ff243f19b6cecf060f4bbedf1752
rhel8/php-82@sha256:e95ec0154f7fb1d1cb0f20ba4e44d5680c00ff243f19b6cecf060f4bbedf1752
rhel8/python-27@sha256:a8e14520797990719ecc602bab889414e4ad3ad977f051cf0e4215b6284ea60c
ubi8/python-27@sha256:a8e14520797990719ecc602bab889414e4ad3ad977f051cf0e4215b6284ea60c
rhel8/python-311@sha256:7bee7e4c923cbb549ac7fe73178dd6565105223d9877e7f5fcd89b65ea36f586
ubi8/python-311@sha256:7bee7e4c923cbb549ac7fe73178dd6565105223d9877e7f5fcd89b65ea36f586
rhel8/python-312@sha256:1ce0b9eceef347c491c2a81bbf4df9cc492ef58a0c54fc207cc092634f1f8afb
ubi8/python-312@sha256:1ce0b9eceef347c491c2a81bbf4df9cc492ef58a0c54fc207cc092634f1f8afb
rhel8/python-36@sha256:33bd3019178be06c3e1248899553e5f36207d7ae5932e77404df6ae2a61daf24
ubi8/python-36@sha256:33bd3019178be06c3e1248899553e5f36207d7ae5932e77404df6ae2a61daf24
ubi8/python-39@sha256:dcd4489e9b4c48c41717f881f641fe16d31b6a5325d5dadd8cb2b38221cd8d8b
rhel8/python-39@sha256:dcd4489e9b4c48c41717f881f641fe16d31b6a5325d5dadd8cb2b38221cd8d8b
ubi8/ruby-25@sha256:7d6b2da12fc7086ed9d48de351c510df74ab1353cf30379c90bfb469d3fe0934
rhel8/ruby-25@sha256:7d6b2da12fc7086ed9d48de351c510df74ab1353cf30379c90bfb469d3fe0934
ubi8/ruby-30@sha256:66eef57a1a50171a3ed0d48a96f94bced14e9129788d9c67206423bddd04547f
rhel8/ruby-30@sha256:66eef57a1a50171a3ed0d48a96f94bced14e9129788d9c67206423bddd04547f
ubi8/ruby-31@sha256:134dc06afb62e7e0083bdb21b957aa1ad1e522255d48cc715353991759b965c5
rhel8/ruby-31@sha256:134dc06afb62e7e0083bdb21b957aa1ad1e522255d48cc715353991759b965c5
rhel8/ruby-33@sha256:4a53702286eea4bfb1b696121852e1ab52bf857938b463430a7c4041c61ca76e
ubi8/ruby-33@sha256:4a53702286eea4bfb1b696121852e1ab52bf857938b463430a7c4041c61ca76e
rhel8/s2i-base@sha256:6df99054fbee3ef015417872ae559370fdcc20e28acf9f4bb8729c1fedf9df5a
ubi8/s2i-base@sha256:6df99054fbee3ef015417872ae559370fdcc20e28acf9f4bb8729c1fedf9df5a
rhel8/varnish-6@sha256:50187149826b68069e12d617a46ad809f973e488c7e29b5c1768893cfbc55c98

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility