Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2025:0250 - Bug Fix Advisory
Issued:
2025-01-15
Updated:
2025-01-15

RHBA-2025:0250 - Bug Fix Advisory

  • Overview
  • Updated Images

Synopsis

Red Hat Quay v3.12.7 bug fix release

Type/Severity

Bug Fix Advisory

Topic

Red Hat Quay 3.12.7 is now available with bug fixes.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Quay 3.12.7

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Quay Enterprise 3 x86_64

Fixes

(none)

CVEs

  • CVE-2019-12900
  • CVE-2021-43618
  • CVE-2023-6004
  • CVE-2023-6918
  • CVE-2023-25193
  • CVE-2023-37920
  • CVE-2024-2398
  • CVE-2024-3596
  • CVE-2024-3651
  • CVE-2024-5535
  • CVE-2024-6345
  • CVE-2024-9287
  • CVE-2024-10041
  • CVE-2024-10963
  • CVE-2024-11168
  • CVE-2024-25062
  • CVE-2024-28182
  • CVE-2024-28834
  • CVE-2024-35195
  • CVE-2024-37891
  • CVE-2024-38796
  • CVE-2024-40897
  • CVE-2024-47538
  • CVE-2024-47607
  • CVE-2024-47615
  • CVE-2024-50602

References

(none)

ppc64le

quay/clair-rhel8@sha256:6d86f13901d8cd7c4c7ccc2e8736716ff6b30414cfb49256844952d86f56f0a8
quay/quay-bridge-operator-bundle@sha256:36bbc999dcf05c91b7504f053b5c7f56f5c34d0783c46497a24c04fa43296c64
quay/quay-bridge-operator-rhel8@sha256:c4e00ce54bd1616c055db7f837fc177f1ad400ecf4f926e1f7c523918db1e945
quay/quay-builder-qemu-rhcos-rhel8@sha256:07e65529d3ac7a7cfbce4c60e97c31f2bfcb56232a207b16eb25946b135dcb56
quay/quay-builder-rhel8@sha256:243f2640dc6d07bb387dabaf2cb08012c30db2ac8d1b74f15a335459bfd36a7a
quay/quay-container-security-operator-bundle@sha256:838deb2355861914e34d3155ded9aecb475ea2f0b9e655cc2710347f4d6c8d87
quay/quay-container-security-operator-rhel8@sha256:d835def577b2f648c185f8d18a38263355f2f527297f223159fb863c459214d6
quay/quay-operator-bundle@sha256:8465c90b84c41a8eac4e92cb7a3120cc56ff5e4aa498fa8d94c332c513d61e36
quay/quay-operator-rhel8@sha256:358734bebe1b998bee9e99c04bf27c8cd9494723a2d43a97bc0fa162acf9807b
quay/quay-rhel8@sha256:9b6bc08c1bdfa17ef7408adb7ae611441bdc4a4a9c3b3cb0509d19ec0a99be3e

s390x

quay/clair-rhel8@sha256:0c8068d85e79410b5cf90052904ecc1f22aa596145e8511f4980bad61ea8bb32
quay/quay-bridge-operator-bundle@sha256:05cf4e92497b825f8da591bfd2af90da29abf84450906acfa8db16f2679750d2
quay/quay-bridge-operator-rhel8@sha256:87caae49038fec19f22e0e9ac6748bf5a8c08c9c0a5d4818fdc28a87ba8fd8f5
quay/quay-builder-qemu-rhcos-rhel8@sha256:ef968a1177abe7c48fe93dc8202ba2c3cddc1e54b5f49f6f695b5098d6b6583b
quay/quay-builder-rhel8@sha256:95a87f2c2a76f5647d82a0ddc708aeb89351067a5a11c122a5935b3f0c40997b
quay/quay-container-security-operator-bundle@sha256:8216ec9e9c11b5215159b7e21e8cbd6a3238353218dd5de8ed6f9ff2ebed5991
quay/quay-container-security-operator-rhel8@sha256:5e4c25c423a82cfd5d033d29ce48c403abae46c1f4ff6676b1e0d7288255bcbc
quay/quay-operator-bundle@sha256:c2ad9b871aab7517a77c0961b720365695677caf8b370ef38860c4d31ff7d20d
quay/quay-operator-rhel8@sha256:53e6569b7cc65013be174adf1fa233c26873fa8ed6a617ec2019faf282ae05d3
quay/quay-rhel8@sha256:698d9dd4b372343e154bff8bf2205c1929bc05d78be1186723deeaf8c6580ff4

x86_64

quay/clair-rhel8@sha256:d3203c3768cb46330a695be1dcdd6f52831d0096a6931d2dbfa1c2c782ed6980
quay/quay-bridge-operator-bundle@sha256:40c83f4c53c4a7e21375e96d6eb66f11fca86b9c139ff1cdfd2dcda0aac28884
quay/quay-bridge-operator-rhel8@sha256:f84497e856179a6790125fa823894a7eecc1a56565455dce17e7e55562b2781f
quay/quay-builder-qemu-rhcos-rhel8@sha256:f73abdb868e3e675b3cd38054292976a7c4757acf857965540ada687c485d75a
quay/quay-builder-rhel8@sha256:f8ea2413a3da488fc09fb4a306d2bda16eda328d535a2c1cf2e603f2989b7da1
quay/quay-container-security-operator-bundle@sha256:f9f8e8ef8487f5f471d92cf7c43a652b51b6a624a96c4fd53e03e0c6d9d10968
quay/quay-container-security-operator-rhel8@sha256:1f3054efe47978df7b5a9fdf64ab8e2094344f9f11544d8d4d993942fd9810e2
quay/quay-operator-bundle@sha256:3bdce7b1dc65ee8be1a77b74111a763860e837aec4454e1f3b65d0e2f2feb24e
quay/quay-operator-rhel8@sha256:e0b518b5a6a56256444ac91c6abc48ec55d26d82cc553447b7957432905ce78f
quay/quay-rhel8@sha256:34a5802123bd6178496c5a0ed5f0b34893d9505d27895d8859a8e373209e6608

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility