Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2024:8371 - Bug Fix Advisory
Issued:
2024-10-31
Updated:
2024-10-31

RHBA-2024:8371 - Bug Fix Advisory

  • Overview
  • Updated Images

Synopsis

Red Hat Quay v3.12.4 bug fix release

Type/Severity

Bug Fix Advisory

Topic

Red Hat Quay 3.12.4 is now available with bug fixes.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Quay 3.12.4

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Quay Enterprise 3 x86_64

Fixes

  • PROJQUAY-6465 - Quay Web UI is showing the quota consumption is NaN KiB
  • PROJQUAY-8006 - Tag delete results in foreign key constraint violation
  • PROJQUAY-8023 - GLOBAL_READONLY_SUPER_USERS doesn't work for /v2/_catalog endpoint
  • PROJQUAY-8059 - Validator prints db password in clear text when debugging is enabled

CVEs

  • CVE-2023-37920
  • CVE-2024-4032
  • CVE-2024-5535
  • CVE-2024-6232
  • CVE-2024-6923
  • CVE-2024-30203
  • CVE-2024-30205
  • CVE-2024-39331
  • CVE-2024-45490
  • CVE-2024-45491
  • CVE-2024-45492

References

(none)

ppc64le

quay/clair-rhel8@sha256:c7f1002bb2ee2ab62240d69f2a86c86cf898a23f4a834cc6f6a2939733eb5ebe
quay/quay-bridge-operator-bundle@sha256:3e106c6dad8b2830d757b71074723e0612ee54efedc20046ca876618dbf6fc92
quay/quay-bridge-operator-rhel8@sha256:837e3b16060764bc0c2ce5bdda7587fc7989321af6770a198c3de31343aaad27
quay/quay-builder-qemu-rhcos-rhel8@sha256:6359aa4fcd543806d2cba07c8b3271d2f49dfa3deba030ca6650323baf856a0f
quay/quay-builder-rhel8@sha256:3e54c23de0e8e5d05e38b9f14663afc7859fb4655d90ab3790334eea619c5b79
quay/quay-container-security-operator-bundle@sha256:f1f3af3c3b9de5469a13aa8301270ded20769406c3bc1ed2304ebfdd0f8bc853
quay/quay-container-security-operator-rhel8@sha256:65759e545af37f21c96749735459d97a43786ac557994b2f2de4c1789055d37b
quay/quay-operator-bundle@sha256:c74c0d453ccc29d8c83fe885cb1ceb592a737d516a157b95c980df22eeeb6947
quay/quay-operator-rhel8@sha256:d54c6bb7561fa43c1bc2a327b686fd3f904a6ec8720a80a900ca4ba9d1f6a6ae
quay/quay-rhel8@sha256:46486bc9eda50e8da8a55ef92ed296d62a36937746110648ef8494c11feb7bd6

s390x

quay/clair-rhel8@sha256:58566dde56979d05ce2d00b4945429f34a34c395d07cf186873a9043f1201bb0
quay/quay-bridge-operator-bundle@sha256:8da8381098066d25b999ba5c013f977125c4a2ae57c1ad1ee26320de650fb943
quay/quay-bridge-operator-rhel8@sha256:fefe2728cebbf9eecc24c7fdc696aee007156deaccd18ca76a52462545eb3efc
quay/quay-builder-qemu-rhcos-rhel8@sha256:ed1b24c76a213e1b31c1d8795c13449b502ba1b7c21eb45d751dc98cf438e6b1
quay/quay-builder-rhel8@sha256:96dffc87449c0ee90430b97db3889fcbb0fbdd46312d5801c207c851485ec2d0
quay/quay-container-security-operator-bundle@sha256:9c02dc34a34eb60b6b1f222757292f157e3a9d6e9c752180822dbfa6d286cb5e
quay/quay-container-security-operator-rhel8@sha256:0adb6f2de9220666ec2b7e74d444046166f8a7d21f040f502e47bf3816f65f04
quay/quay-operator-bundle@sha256:3355fc72abd4bdae89b4b607e34e720aab038e816783d7513790b8f5a0dff02d
quay/quay-operator-rhel8@sha256:377279ddd042201825470912b058d2d97c7c671caddf7b90987f34416298b3bb
quay/quay-rhel8@sha256:27771a22be9ead148eb98ac916e0bf421762f9ed671145c01c413097abfedb7c

x86_64

quay/clair-rhel8@sha256:f98f73d7eccee4fbddfa681bcce4ec053267458c38386f9442186fba5f922f97
quay/quay-bridge-operator-bundle@sha256:49fb4ef311d46bd461cb44ea2e19b233cc529fc6c99eecc8cb201920fc435cec
quay/quay-bridge-operator-rhel8@sha256:72985f3e19005e41d67337859fc27b1d409afa38d2720fa8a7e9122f93acc21e
quay/quay-builder-qemu-rhcos-rhel8@sha256:358040363effe0c44b8bc69e74dfcc31a026a2ce4a51feb99896da4dba470fbd
quay/quay-builder-rhel8@sha256:321e3e88704a83183c423f086f8f847944c14b9b6540bab665bd9e79782e777d
quay/quay-container-security-operator-bundle@sha256:50fb0aa855742723273ecb58aca09c79335b563f0a5db56e70ee77a70186b859
quay/quay-container-security-operator-rhel8@sha256:cc33102377fc3be6735a93d6fcffa202b0f2de0e295ab81ce55e81a00d5d707a
quay/quay-operator-bundle@sha256:a1ac11f84a39c5b67a6bb1256643306e4a4e46fbc85e4536957fa1a3d0d09d3e
quay/quay-operator-rhel8@sha256:5a6831c6c1d1cc7f2ab56a7f8d53a3f3178f185de8cf4fd6796b9debbac5e887
quay/quay-rhel8@sha256:e5f0cbfd748b1d3e0714056032a8fceb275fdf505c3989557c94f57dbb5fed8a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility