- Issued:
- 2025-07-28
- Updated:
- 2025-07-28
RHSA-2025:11889 - Security Advisory
Synopsis
Important: 7.1 container image is now available in the Red Hat Ecosystem Catalog.
Type/Severity
Security Advisory: Important
Topic
Updated rhceph-7.1 container image is now available in the Red Hat Ecosystem Catalog.
Description
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
This new container image is based on Red Hat Ceph Storage 7.1 and Red Hat Enterprise Linux 8.10, 9.4, 9.5.
Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:
https://docs.redhat.com/en/documentation/red_hat_ceph_storage/7/html/7.1_release_notes
All users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides security and bug fixes.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/2789521
For supported configurations, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
Fixes
- BZ - 2268017 - CVE-2023-45290 golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm
- BZ - 2295310 - CVE-2024-24791 net/http: Denial of service due to improper 100-continue handling in net/http
- BZ - 2342464 - CVE-2025-22865 crypto/x509: ParsePKCS1PrivateKey panic with partial keys in crypto/x509
- BZ - 2348366 - CVE-2025-22868 golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws
- BZ - 2349390 - CVE-2024-53382 prismjs: DOM Clobbering vulnerability within the Prism library's prism-autoloader plugin
CVEs
- CVE-2023-45290
- CVE-2024-12718
- CVE-2024-24791
- CVE-2024-52533
- CVE-2024-52615
- CVE-2024-53382
- CVE-2025-3576
- CVE-2025-4138
- CVE-2025-4330
- CVE-2025-4373
- CVE-2025-4435
- CVE-2025-4517
- CVE-2025-5702
- CVE-2025-6020
- CVE-2025-6021
- CVE-2025-22865
- CVE-2025-22868
- CVE-2025-25724
- CVE-2025-32462
- CVE-2025-47273
- CVE-2025-49794
- CVE-2025-49796
ppc64le
| rhceph/grafana-rhel9@sha256:6cda0f988f558e6b84bfd3f5f9cc4714dccc31ea8084426a599ab5bf7463790b |
| rhceph/grafana-rhel10@sha256:6cda0f988f558e6b84bfd3f5f9cc4714dccc31ea8084426a599ab5bf7463790b |
| rhceph/keepalived-rhel9@sha256:721d699e4e760184f55c07fc1e6353f415c031e6cb152292f75842bc2f2c87a7 |
| rhceph/rhceph-7-rhel9@sha256:6c77851d97bf4b24d16c29b002ee1ee7fc1bc29df8e314b6f2d5e421ed92ec0a |
| rhceph/rhceph-haproxy-rhel9@sha256:fd3389ccf403e9c4aa46b48b7b38634af10487ae3e3eedb82963aa66eccf24bb |
| rhceph/rhceph-promtail-rhel9@sha256:6bd085dd5271317648995304eed0b4c6f1d7f1e7812f49b87f140d77d90f7a2a |
| rhceph/snmp-notifier-rhel9@sha256:dc9e3653e236d0c5409f7faf45ea6c0036d2647d22afeee09c76ea0dc0ff30bb |
s390x
| rhceph/grafana-rhel9@sha256:4d77ac1b0dd4d16cf8e9d783c45ab21ca36d5e667e9c2d8fd930ea70a130a4a8 |
| rhceph/grafana-rhel10@sha256:4d77ac1b0dd4d16cf8e9d783c45ab21ca36d5e667e9c2d8fd930ea70a130a4a8 |
| rhceph/keepalived-rhel9@sha256:22c99821cffab668e9a439e8cdc87fe5558a8c1e9c968073c47ffd2ac4000384 |
| rhceph/rhceph-7-rhel9@sha256:474278d28a1b50342b0aa2119eca426f92d12229eac2d74f1d1133d30c609f7a |
| rhceph/rhceph-haproxy-rhel9@sha256:abb5ef5afaa23055c293a3b85e699912c80348942a6b4f78ce7b18e784bdfaf7 |
| rhceph/rhceph-promtail-rhel9@sha256:e39c4a658b123efe01f57fd7968ecc077fdb06397ed69183d06fcd9f473f9b4b |
| rhceph/snmp-notifier-rhel9@sha256:f0c247741c38681ba3dd2d995a686ded153542912c05281587bebac1d675c2f0 |
x86_64
| rhceph/grafana-rhel9@sha256:88df9536f8c989d2f2d7ba76a23ec1fb5e7e10ed6867dc5410f7a4a6fbb4957d |
| rhceph/grafana-rhel10@sha256:88df9536f8c989d2f2d7ba76a23ec1fb5e7e10ed6867dc5410f7a4a6fbb4957d |
| rhceph/keepalived-rhel9@sha256:b43581af4184e107019a325ccdf5c4678a1a3f146a2707a51276cd5719286ac9 |
| rhceph/rhceph-7-rhel9@sha256:43e2fd3e4c33b6fde8b27dde23d67bf0e1c951c729f3ea371c666fb5959a9424 |
| rhceph/rhceph-haproxy-rhel9@sha256:3a3ec2a0cc16b62a99fdf4a84e08a07f78ca9d06707d5bc5d908dd6b78697c43 |
| rhceph/rhceph-promtail-rhel9@sha256:d7ac1a07b8868ca0cc9f71e985724cce448b55618bd2e4e1dba910c46573f34e |
| rhceph/snmp-notifier-rhel9@sha256:4dc115f65dc347ee3dd69a19a9d7768267e97fceba905dd51710ce7651e55593 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.