- Issued:
- 2024-07-15
- Updated:
- 2024-07-15
RHBA-2024:3938 - Bug Fix Advisory
Synopsis
Red Hat Quay v3.11.2 bug fix release
Type/Severity
Bug Fix Advisory
Topic
Red Hat Quay 3.11.2 is now available with bug fixes.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Quay 3.11.2
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Quay Enterprise 3 x86_64
Fixes
- PROJQUAY-7182 - Upgrade from 3.8 to 3.9, postgresql data lost
- PROJQUAY-7307 - Resolve related bugs (redhat-3.11)
- PROJQUAY-7314 - Update quay codebase to support Sqlite db
- PROJQUAY-7134 - listOrgLogs api with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7135 - getAggregateOrgLogs api with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7136 - exportOrgLogs api with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7138 - changeOrganizationDetails API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7139 - deleteAdminedOrganization api with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7147 - getOrganizationMember API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7148 - removeOrganizationMember API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7149 - listOrganizationQuotaLimit API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7150 - getOrganizationQuotaLimit API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7151 - createRepo API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7153 - getOrganizationTeamPermissions API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7154 - deleteOrganizationTeamMember API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7155 - getOrganizationTeamMembers API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7157 - getOrganizationPrototypePermissions API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7158 - listRepositoryAutoPrunePolicies API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7159 - getRepositoryAutoPrunePolicy API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7160 - createRepositoryAutoPrunePolicy API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7161 - updateRepositoryAutoPrunePolicy API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
- PROJQUAY-7162 - deleteRepositoryAutoPrunePolicy API with super user token doesn't work when enable FEATURE_SUPERUSERS_FULL_ACCESS
CVEs
- CVE-2020-15778
- CVE-2021-43618
- CVE-2022-36763
- CVE-2022-36764
- CVE-2022-36765
- CVE-2022-48624
- CVE-2023-2953
- CVE-2023-6004
- CVE-2023-6597
- CVE-2023-6918
- CVE-2023-25193
- CVE-2023-37328
- CVE-2023-43785
- CVE-2023-43786
- CVE-2023-43787
- CVE-2023-45229
- CVE-2023-45231
- CVE-2023-45232
- CVE-2023-45233
- CVE-2023-45235
- CVE-2024-0450
- CVE-2024-3651
- CVE-2024-25062
- CVE-2024-28182
- CVE-2024-28834
- CVE-2024-32002
- CVE-2024-32004
- CVE-2024-32020
- CVE-2024-32021
- CVE-2024-32465
- CVE-2024-32487
- CVE-2024-33599
- CVE-2024-33600
- CVE-2024-33601
- CVE-2024-33602
References
(none)
ppc64le
quay/clair-rhel8@sha256:84ef23ce60945f133e6ab42a331c6ace3a25f7debfdc3d5483cb50ff50339869 |
quay/quay-bridge-operator-bundle@sha256:80c88710698256dfbcbbbc9ea593e1acf038c6e46361a77b6633eb06ed3b02c5 |
quay/quay-bridge-operator-rhel8@sha256:317432da1602b5bd6c3a8d12e3d0a7386afd06471cbcc6f861750d80108f937f |
quay/quay-builder-qemu-rhcos-rhel8@sha256:7babc8ddff6034297debbd0535758113566b0b9c7925646bad8d6a3d180a95a8 |
quay/quay-builder-rhel8@sha256:84fff880ee47a1555470a14268420c499806de5fcc893ff00c50bff7b502093c |
quay/quay-container-security-operator-bundle@sha256:0e66370547b5e6a52f6ac449ff0cfac8c57bfdd78933d22ad4c3029667bfe300 |
quay/quay-container-security-operator-rhel8@sha256:ccb9e7edb9caae9df7e00d662a4b2b41311c22710a03d4a7c5805b65e143084b |
quay/quay-operator-bundle@sha256:beba1fd3b93a6ebe780207d24856b592a3a9aa4ee7fa8c2c0b265b82d756e835 |
quay/quay-operator-rhel8@sha256:7ec1740ed55ca9a171905c5c1baf693278bf0732c16e4d0c80eefec8e9b8dc5b |
quay/quay-rhel8@sha256:b5e2985babcf0087128f37e0d4093326ec391a4d334625dbd0f2b6ee393cb80e |
s390x
quay/clair-rhel8@sha256:f5599054e40bc1a3b32732ac325d4723d31d97b78d354ecf4770fc6a7b78c94f |
quay/quay-bridge-operator-bundle@sha256:1fc286ac5af65fc8fe0d88e8fe2d4ae650b585fec5c456c0deb278f730cc484c |
quay/quay-bridge-operator-rhel8@sha256:d60bef40a892a7b1d80c952877e0d6598dc2d926996261bcd4c54ab107321dd2 |
quay/quay-builder-qemu-rhcos-rhel8@sha256:393ba2743dd0cdb2faa89abc1df9a6946c5d07421ad46533b19be37dcede3aa8 |
quay/quay-builder-rhel8@sha256:1295e2fd66831fe25e13bb295e8e62b70d510566afe2a823eac08d15a1525674 |
quay/quay-container-security-operator-bundle@sha256:bd15f8daac15210cd0dbc1b15fd0d649f5d35ec3be8af975a16834cd7c3a94e3 |
quay/quay-container-security-operator-rhel8@sha256:b1d372435113ca8c8759cf5810cc99544c3f5f8846ee535c28abb7453704d5b0 |
quay/quay-operator-bundle@sha256:fce8bd1512772586eadfb27cdc76341cc19adbf97d22988b73ee0bf515282c1e |
quay/quay-operator-rhel8@sha256:87a7bf96212a2576af983d03de7afa596e5e4430e0ea40e61dbfc75141417fac |
quay/quay-rhel8@sha256:c3eb6800ec4e170409a63a37fdc9a33733fff216b4f133ca01b1d3088c2bdf6c |
x86_64
quay/clair-rhel8@sha256:82b9f05675d34f43fa5aa24c1a8827bbce2f4c36072f48cdc2914b4ca17f7d65 |
quay/quay-bridge-operator-bundle@sha256:d44bc0f8c7a678a77dd3869dafef45894822713c62b243a0c96e22e5298d1232 |
quay/quay-bridge-operator-rhel8@sha256:d09c6e74382b5d1e3da943c3f355ef42babaf5d97e9f0ef3651611d6311e64d5 |
quay/quay-builder-qemu-rhcos-rhel8@sha256:ef702ceb78eef607fee8fa7fbf853d6b09ffe7f82081f7217a793096d9f6428b |
quay/quay-builder-rhel8@sha256:bd030c3294f5367c49381b97db405bc16876e1b80f37371961d189a130222902 |
quay/quay-container-security-operator-bundle@sha256:8fc47259ab3d3b2bb8e2adfd0857d91287ab621b3f51af0604ce76df90947fd9 |
quay/quay-container-security-operator-rhel8@sha256:837d191b321adecf172a6803976872c260f9b9e0f1e0607f77f06c0d401fe06b |
quay/quay-operator-bundle@sha256:cbd085eaf4a84540b3e1430d2cfade8725d8a2ba1573a400a3b00507cbe33261 |
quay/quay-operator-rhel8@sha256:c91344794bc42c49b3cb6f2553f254df57830534282376b785a972b5ece259f3 |
quay/quay-rhel8@sha256:1c0265f51bc583752ddff34244d495f383408492f6005654cbcc4c74c6f14d71 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.