- 发布:
- 2024-12-02
- 已更新:
- 2024-12-02
RHEA-2024:10654 - Product Enhancement Advisory
概述
Red Hat 3scale API Management 2.14.3 Release - Container Images
类型/严重性
Product Enhancement Advisory
标题
Red Hat 3scale API Management 2.14.3 Release - Container Images
描述
Release of 3scale API Management components provides these changes:
解决方案
Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.14/html-single/installing_3scale/index
受影响的产品
- Red Hat 3scale API Management Platform 2 for RHEL 8 x86_64
- Red Hat 3scale API Management Platform 2 for RHEL 8 s390x
- Red Hat 3scale API Management Platform 2 for RHEL 8 ppc64le
- Red Hat 3scale API Management Platform 2 for RHEL 7 x86_64
- Red Hat 3scale API Management Platform 2 for RHEL 7 s390x
- Red Hat 3scale API Management Platform 2 for RHEL 7 ppc64le
修复
- THREESCALE-11346 - 2.14 Backporting - Backend Support for WSS Protocol
- THREESCALE-11462 - Bump version of apicast operator to 0.8.3 for 2.14.3
CVE
- CVE-2021-46939
- CVE-2021-47018
- CVE-2021-47257
- CVE-2021-47284
- CVE-2021-47304
- CVE-2021-47373
- CVE-2021-47408
- CVE-2021-47461
- CVE-2021-47468
- CVE-2021-47491
- CVE-2021-47548
- CVE-2021-47579
- CVE-2021-47624
- CVE-2022-48632
- CVE-2022-48743
- CVE-2022-48747
- CVE-2022-48757
- CVE-2023-28746
- CVE-2023-52451
- CVE-2023-52463
- CVE-2023-52469
- CVE-2023-52471
- CVE-2023-52486
- CVE-2023-52530
- CVE-2023-52619
- CVE-2023-52622
- CVE-2023-52623
- CVE-2023-52648
- CVE-2023-52653
- CVE-2023-52658
- CVE-2023-52662
- CVE-2023-52679
- CVE-2023-52707
- CVE-2023-52730
- CVE-2023-52756
- CVE-2023-52762
- CVE-2023-52764
- CVE-2023-52775
- CVE-2023-52777
- CVE-2023-52784
- CVE-2023-52791
- CVE-2023-52796
- CVE-2023-52803
- CVE-2023-52811
- CVE-2023-52832
- CVE-2023-52834
- CVE-2023-52845
- CVE-2023-52847
- CVE-2023-52864
- CVE-2024-2201
- CVE-2024-6345
- CVE-2024-21823
- CVE-2024-25739
- CVE-2024-26586
- CVE-2024-26614
- CVE-2024-26640
- CVE-2024-26660
- CVE-2024-26669
- CVE-2024-26686
- CVE-2024-26698
- CVE-2024-26704
- CVE-2024-26733
- CVE-2024-26740
- CVE-2024-26772
- CVE-2024-26773
- CVE-2024-26802
- CVE-2024-26810
- CVE-2024-26837
- CVE-2024-26840
- CVE-2024-26843
- CVE-2024-26852
- CVE-2024-26853
- CVE-2024-26870
- CVE-2024-26878
- CVE-2024-26908
- CVE-2024-26921
- CVE-2024-26925
- CVE-2024-26929
- CVE-2024-26931
- CVE-2024-26940
- CVE-2024-26958
- CVE-2024-26960
- CVE-2024-26961
- CVE-2024-27010
- CVE-2024-27011
- CVE-2024-27019
- CVE-2024-27020
- CVE-2024-27025
- CVE-2024-27065
- CVE-2024-27388
- CVE-2024-27395
- CVE-2024-27434
- CVE-2024-31076
- CVE-2024-33621
- CVE-2024-35790
- CVE-2024-35801
- CVE-2024-35807
- CVE-2024-35810
- CVE-2024-35814
- CVE-2024-35823
- CVE-2024-35824
- CVE-2024-35847
- CVE-2024-35876
- CVE-2024-35893
- CVE-2024-35896
- CVE-2024-35897
- CVE-2024-35899
- CVE-2024-35900
- CVE-2024-35910
- CVE-2024-35912
- CVE-2024-35924
- CVE-2024-35925
- CVE-2024-35930
- CVE-2024-35937
- CVE-2024-35938
- CVE-2024-35946
- CVE-2024-35947
- CVE-2024-35952
- CVE-2024-35962
- CVE-2024-36000
- CVE-2024-36005
- CVE-2024-36006
- CVE-2024-36010
- CVE-2024-36016
- CVE-2024-36017
- CVE-2024-36020
- CVE-2024-36025
- CVE-2024-36270
- CVE-2024-36286
- CVE-2024-36489
- CVE-2024-36886
- CVE-2024-36889
- CVE-2024-36896
- CVE-2024-36904
- CVE-2024-36905
- CVE-2024-36917
- CVE-2024-36921
- CVE-2024-36924
- CVE-2024-36927
- CVE-2024-36929
- CVE-2024-36933
- CVE-2024-36940
- CVE-2024-36941
- CVE-2024-36945
- CVE-2024-36950
- CVE-2024-36952
- CVE-2024-36954
- CVE-2024-36960
- CVE-2024-36971
- CVE-2024-36978
- CVE-2024-36979
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-38538
- CVE-2024-38555
- CVE-2024-38573
- CVE-2024-38575
- CVE-2024-38596
- CVE-2024-38598
- CVE-2024-38615
- CVE-2024-38627
- CVE-2024-39276
- CVE-2024-39472
- CVE-2024-39476
- CVE-2024-39487
- CVE-2024-39502
- CVE-2024-40927
- CVE-2024-40974
参考
(none)
ppc64le
3scale-amp2/3scale-auth-wasm-rhel8@sha256:13a86771bb11c3d06e5b2593315ee7ac3d27dbe1794b35fa1ea17d692a768d5f |
3scale-amp2/3scale-rhel7-operator@sha256:9f28a01fbaa0989419b9ae8843c51656ee50c373dbe13d25dcff445cf9843f86 |
3scale-amp2/3scale-rhel7-operator-metadata@sha256:b7e744d0da70aaa25572a8502a3dd6994c008a481bdbcdcd712e5556b11966bb |
3scale-amp2/apicast-gateway-rhel8@sha256:0fa248487e31b6f5fd989ad31634d68080817e3662c2b1e834f620ae03837513 |
3scale-amp2/apicast-rhel7-operator@sha256:fffcc8a2b4f7aa34eccd6459966a77bb9bdded36b185a5e25ce29606b7c947fb |
3scale-amp2/apicast-rhel7-operator-metadata@sha256:2b3e35f0ffbdfd9491e25659a7ef100e6ce7754f0acc034910e631438279cd39 |
3scale-amp2/backend-rhel8@sha256:71e5571650e1ef6249e049cc5d6914ddc3fdf8a96911f881aa0000c88aad7619 |
3scale-amp2/memcached-rhel7@sha256:75efaffcdd4ce86df8e41d5847cf602f232c8e72baa6c64e4c8608626364b479 |
3scale-amp2/searchd-rhel7@sha256:af40feacf5e9cc8f6bf794d39faae397e36fcd7606a578b6575be65fb90d6858 |
3scale-amp2/system-rhel7@sha256:9d81bd8c07f9aaf07f91ef25139327bf1bc103d33a1f6ea0b4bb5f9efceef7f4 |
3scale-amp2/toolbox-rhel8@sha256:6bab364f1164f36794266bc9e6a277736eb4c7259e8f1dc2ce160c7af29db460 |
3scale-amp2/zync-rhel9@sha256:4b45072956e317e11f27f4b7304d02eb3dfbc2d6418b3119c6c9bbb57d0a869a |
s390x
3scale-amp2/3scale-rhel7-operator@sha256:71078467486508eb3ac221c47bdfcfd5d07d4a122daf16a99dcc00f7dbd5bb28 |
3scale-amp2/3scale-rhel7-operator-metadata@sha256:61878f644ce3b8a42561ed1db0de8579250a235635e37e9bd8edf59b297e180f |
3scale-amp2/apicast-gateway-rhel8@sha256:fe87a796693f677ad1e91f19236731b97c6a5c8c8f1f1728613441132f42eed9 |
3scale-amp2/apicast-rhel7-operator@sha256:f44005ee79a0b309b06432343888ca6f9b962fb43ae3c49c7dad2978171bea4b |
3scale-amp2/apicast-rhel7-operator-metadata@sha256:fe0e88d5db8ea354d24be5eb94957d9535d9df99a4fcbf45953b4ce72032d932 |
3scale-amp2/backend-rhel8@sha256:2819c736f97270fcb96498c7303ea2b3e11857a4cc5cd1e2d6bfbf47b50b1f77 |
3scale-amp2/memcached-rhel7@sha256:2852270a1824597c12a1134d010a2db47cde20347365145d970fa0a4b36ebc43 |
3scale-amp2/searchd-rhel7@sha256:21e486c6fc55116a90c7d913f978f43075d154db746bbe7adc9a8fb980544e17 |
3scale-amp2/system-rhel7@sha256:0d5c1e8becc1f3b17660e3b0edce7a69fd2bd33e09d5a372f60eb34107e19795 |
3scale-amp2/toolbox-rhel8@sha256:8d8872e798f4a83184ef92574126008368d4945daa48e3b6c68ae3a5a595901e |
3scale-amp2/zync-rhel9@sha256:d54a87fa3c86e7e664d7e5a09b866c14ccb934455378e32747b0b41c8bf467cf |
x86_64
3scale-amp2/3scale-auth-wasm-rhel8@sha256:f630cbfda55c5ccaffef81122a0e4cf24e24d7bfb1642eead22c938ca0ffa76a |
3scale-amp2/3scale-rhel7-operator@sha256:4180093b6f6fd38542b2a122d838a22d250d2258766d6a20dd7cb1b00c6e7608 |
3scale-amp2/3scale-rhel7-operator-metadata@sha256:53f34cda12e9e32e29a76d35b4be77a40a5b61bdff89337dd4a564402351bd24 |
3scale-amp2/apicast-gateway-rhel8@sha256:2d40298d0960b1c18c4f9379a884720c2c79f14bc01694d70193af621272b713 |
3scale-amp2/apicast-rhel7-operator@sha256:caf1be4ab09a074029af9100414a3756aa480251bbfbee79b91480e8682e77d3 |
3scale-amp2/apicast-rhel7-operator-metadata@sha256:81d4fe1308d0ee0aad5323418aef48dd2ea082591c8b14b64e8a37ee70b42554 |
3scale-amp2/backend-rhel8@sha256:36e4b12158e39d0e27ac68b453b18d4cb9bfc845dc7cbeb8f027a13b2d4bfa0f |
3scale-amp2/memcached-rhel7@sha256:d2c013ca01a88b20f5739f77d9996d858fb3c95c8c743512c7412e28a681da87 |
3scale-amp2/searchd-rhel7@sha256:0347f8aa3ade3794b2b58b91f6cf2932ee8d5dcd71c3ed152125c374b35e3065 |
3scale-amp2/system-rhel7@sha256:abb9b0430585d18fe120a765ebdee8f0fee09b4cea2a169525d2cf831be77f80 |
3scale-amp2/toolbox-rhel8@sha256:e1e949b55de720759f04b5b6f738a6b5c401770e3e021bd28aeb314a033f1f76 |
3scale-amp2/zync-rhel9@sha256:f53aa2760cc6fc50222c70ffabb0a916c01792dc7b4abebcdb6ff075baaee73a |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。