- Issued:
- 2022-12-06
- Updated:
- 2022-12-06
RHBA-2022:6976 - Bug Fix Advisory
Synopsis
Red Hat Quay v3.8.0 minor release
Type/Severity
Bug Fix Advisory
Topic
Red Hat Quay 3.8.0 is now available with bug fixes.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Quay 3.8.0
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Quay Enterprise 3 x86_64
Fixes
- PROJQUAY-4305 - Change logentry3 metadata_json size on MySQL deployments
- PROJQUAY-2179 - Support repo mirror of repos that don't have a latest tag
- PROJQUAY-4591 - Add support for cosign SBOM media types
- PROJQUAY-4585 - Project Quay unable to mirror registry.ci.openshift.org
- PROJQUAY-1245 - Superusers can see and control all content
- PROJQUAY-2604 - Ability to create users with read-only global access
- PROJQUAY-272 - IPv6 support in Quay image
- PROJQUAY-3063 - As a Quay admin I want to leverage storage quota limits to keep the size of a proxy organization within certain bounds
- PROJQUAY-3456 - Pull-thru proxy GA
- PROJQUAY-3865 - Phase 1: MVP UI for Normal & Superusers
- PROJQUAY-663 - Restricted users
- PROJQUAY-1232 - Update Quay's packages for Python 3.9 compatibility
CVEs
- CVE-2016-3709
- CVE-2022-0934
- CVE-2022-1304
- CVE-2022-3515
- CVE-2022-22624
- CVE-2022-22628
- CVE-2022-22629
- CVE-2022-22662
- CVE-2022-24795
- CVE-2022-25308
- CVE-2022-25309
- CVE-2022-25310
- CVE-2022-26700
- CVE-2022-26709
- CVE-2022-26710
- CVE-2022-26716
- CVE-2022-26717
- CVE-2022-26719
- CVE-2022-27404
- CVE-2022-27405
- CVE-2022-27406
- CVE-2022-30293
- CVE-2022-42898
References
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.