- Issued:
- 2025-07-14
- Updated:
- 2025-07-14
RHBA-2025:10843 - Bug Fix Advisory
Synopsis
Updated rhel-els container image
Type/Severity
Bug Fix Advisory
Topic
Updated rhel-els container image is now available for use only by other Red Hat products.
Description
The rhel-els container image is designed and engineered to be used by other Red Hat products. This image is only supported for approved Red Hat products. This image is maintained by Red Hat and updated regularly.
Solution
The container image provided by this update is used only as the base layer for other Red Hat products. Direct use of this image is neither recommended nor supported.
Affected Products
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
Fixes
- BZ - 2370010 - CVE-2025-4435 cpython: Tarfile extracts filtered members when errorlevel=0
- BZ - 2370013 - CVE-2024-12718 cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
- BZ - 2370014 - CVE-2025-4330 cpython: python: Extraction filter bypass for linking outside extraction directory
- BZ - 2370016 - CVE-2025-4517 python: cpython: Arbitrary writes via tarfile realpath overflow
- BZ - 2372426 - CVE-2025-4138 cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
References
(none)
ppc64le
| rhel8-6-els/rhel@sha256:bad179fbcb834d05af67eb762d39a479a5e4cd9056b778e88e34959b90a850b8 |
x86_64
| rhel8-6-els/rhel@sha256:114fdcfd98d940b55809a7a0efcbcb83c516705322966748788d1d004d32fe9f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.