Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2024:10654 - Product Enhancement Advisory
Issued:
2024-12-02
Updated:
2024-12-02

RHEA-2024:10654 - Product Enhancement Advisory

  • Overview
  • Updated Images

Synopsis

Red Hat 3scale API Management 2.14.3 Release - Container Images

Type/Severity

Product Enhancement Advisory

Topic

Red Hat 3scale API Management 2.14.3 Release - Container Images

Description

Release of 3scale API Management components provides these changes:

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.14/html-single/installing_3scale/index

Affected Products

  • Red Hat 3scale API Management Platform 2 for RHEL 8 x86_64
  • Red Hat 3scale API Management Platform 2 for RHEL 8 s390x
  • Red Hat 3scale API Management Platform 2 for RHEL 8 ppc64le
  • Red Hat 3scale API Management Platform 2 for RHEL 7 x86_64
  • Red Hat 3scale API Management Platform 2 for RHEL 7 s390x
  • Red Hat 3scale API Management Platform 2 for RHEL 7 ppc64le

Fixes

  • THREESCALE-11346 - 2.14 Backporting - Backend Support for WSS Protocol
  • THREESCALE-11462 - Bump version of apicast operator to 0.8.3 for 2.14.3

CVEs

  • CVE-2021-46939
  • CVE-2021-47018
  • CVE-2021-47257
  • CVE-2021-47284
  • CVE-2021-47304
  • CVE-2021-47373
  • CVE-2021-47408
  • CVE-2021-47461
  • CVE-2021-47468
  • CVE-2021-47491
  • CVE-2021-47548
  • CVE-2021-47579
  • CVE-2021-47624
  • CVE-2022-48632
  • CVE-2022-48743
  • CVE-2022-48747
  • CVE-2022-48757
  • CVE-2023-28746
  • CVE-2023-52451
  • CVE-2023-52463
  • CVE-2023-52469
  • CVE-2023-52471
  • CVE-2023-52486
  • CVE-2023-52530
  • CVE-2023-52619
  • CVE-2023-52622
  • CVE-2023-52623
  • CVE-2023-52648
  • CVE-2023-52653
  • CVE-2023-52658
  • CVE-2023-52662
  • CVE-2023-52679
  • CVE-2023-52707
  • CVE-2023-52730
  • CVE-2023-52756
  • CVE-2023-52762
  • CVE-2023-52764
  • CVE-2023-52775
  • CVE-2023-52777
  • CVE-2023-52784
  • CVE-2023-52791
  • CVE-2023-52796
  • CVE-2023-52803
  • CVE-2023-52811
  • CVE-2023-52832
  • CVE-2023-52834
  • CVE-2023-52845
  • CVE-2023-52847
  • CVE-2023-52864
  • CVE-2024-2201
  • CVE-2024-6345
  • CVE-2024-21823
  • CVE-2024-25739
  • CVE-2024-26586
  • CVE-2024-26614
  • CVE-2024-26640
  • CVE-2024-26660
  • CVE-2024-26669
  • CVE-2024-26686
  • CVE-2024-26698
  • CVE-2024-26704
  • CVE-2024-26733
  • CVE-2024-26740
  • CVE-2024-26772
  • CVE-2024-26773
  • CVE-2024-26802
  • CVE-2024-26810
  • CVE-2024-26837
  • CVE-2024-26840
  • CVE-2024-26843
  • CVE-2024-26852
  • CVE-2024-26853
  • CVE-2024-26870
  • CVE-2024-26878
  • CVE-2024-26908
  • CVE-2024-26921
  • CVE-2024-26925
  • CVE-2024-26929
  • CVE-2024-26931
  • CVE-2024-26940
  • CVE-2024-26958
  • CVE-2024-26960
  • CVE-2024-26961
  • CVE-2024-27010
  • CVE-2024-27011
  • CVE-2024-27019
  • CVE-2024-27020
  • CVE-2024-27025
  • CVE-2024-27065
  • CVE-2024-27388
  • CVE-2024-27395
  • CVE-2024-27434
  • CVE-2024-31076
  • CVE-2024-33621
  • CVE-2024-35790
  • CVE-2024-35801
  • CVE-2024-35807
  • CVE-2024-35810
  • CVE-2024-35814
  • CVE-2024-35823
  • CVE-2024-35824
  • CVE-2024-35847
  • CVE-2024-35876
  • CVE-2024-35893
  • CVE-2024-35896
  • CVE-2024-35897
  • CVE-2024-35899
  • CVE-2024-35900
  • CVE-2024-35910
  • CVE-2024-35912
  • CVE-2024-35924
  • CVE-2024-35925
  • CVE-2024-35930
  • CVE-2024-35937
  • CVE-2024-35938
  • CVE-2024-35946
  • CVE-2024-35947
  • CVE-2024-35952
  • CVE-2024-35962
  • CVE-2024-36000
  • CVE-2024-36005
  • CVE-2024-36006
  • CVE-2024-36010
  • CVE-2024-36016
  • CVE-2024-36017
  • CVE-2024-36020
  • CVE-2024-36025
  • CVE-2024-36270
  • CVE-2024-36286
  • CVE-2024-36489
  • CVE-2024-36886
  • CVE-2024-36889
  • CVE-2024-36896
  • CVE-2024-36904
  • CVE-2024-36905
  • CVE-2024-36917
  • CVE-2024-36921
  • CVE-2024-36924
  • CVE-2024-36927
  • CVE-2024-36929
  • CVE-2024-36933
  • CVE-2024-36940
  • CVE-2024-36941
  • CVE-2024-36945
  • CVE-2024-36950
  • CVE-2024-36952
  • CVE-2024-36954
  • CVE-2024-36960
  • CVE-2024-36971
  • CVE-2024-36978
  • CVE-2024-36979
  • CVE-2024-37370
  • CVE-2024-37371
  • CVE-2024-38538
  • CVE-2024-38555
  • CVE-2024-38573
  • CVE-2024-38575
  • CVE-2024-38596
  • CVE-2024-38598
  • CVE-2024-38615
  • CVE-2024-38627
  • CVE-2024-39276
  • CVE-2024-39472
  • CVE-2024-39476
  • CVE-2024-39487
  • CVE-2024-39502
  • CVE-2024-40927
  • CVE-2024-40974

References

(none)

ppc64le

3scale-amp2/3scale-auth-wasm-rhel8@sha256:13a86771bb11c3d06e5b2593315ee7ac3d27dbe1794b35fa1ea17d692a768d5f
3scale-amp2/3scale-rhel7-operator@sha256:9f28a01fbaa0989419b9ae8843c51656ee50c373dbe13d25dcff445cf9843f86
3scale-amp2/3scale-rhel7-operator-metadata@sha256:b7e744d0da70aaa25572a8502a3dd6994c008a481bdbcdcd712e5556b11966bb
3scale-amp2/apicast-gateway-rhel8@sha256:0fa248487e31b6f5fd989ad31634d68080817e3662c2b1e834f620ae03837513
3scale-amp2/apicast-rhel7-operator@sha256:fffcc8a2b4f7aa34eccd6459966a77bb9bdded36b185a5e25ce29606b7c947fb
3scale-amp2/apicast-rhel7-operator-metadata@sha256:2b3e35f0ffbdfd9491e25659a7ef100e6ce7754f0acc034910e631438279cd39
3scale-amp2/backend-rhel8@sha256:71e5571650e1ef6249e049cc5d6914ddc3fdf8a96911f881aa0000c88aad7619
3scale-amp2/memcached-rhel7@sha256:75efaffcdd4ce86df8e41d5847cf602f232c8e72baa6c64e4c8608626364b479
3scale-amp2/searchd-rhel7@sha256:af40feacf5e9cc8f6bf794d39faae397e36fcd7606a578b6575be65fb90d6858
3scale-amp2/system-rhel7@sha256:9d81bd8c07f9aaf07f91ef25139327bf1bc103d33a1f6ea0b4bb5f9efceef7f4
3scale-amp2/toolbox-rhel8@sha256:6bab364f1164f36794266bc9e6a277736eb4c7259e8f1dc2ce160c7af29db460
3scale-amp2/zync-rhel9@sha256:4b45072956e317e11f27f4b7304d02eb3dfbc2d6418b3119c6c9bbb57d0a869a

s390x

3scale-amp2/3scale-rhel7-operator@sha256:71078467486508eb3ac221c47bdfcfd5d07d4a122daf16a99dcc00f7dbd5bb28
3scale-amp2/3scale-rhel7-operator-metadata@sha256:61878f644ce3b8a42561ed1db0de8579250a235635e37e9bd8edf59b297e180f
3scale-amp2/apicast-gateway-rhel8@sha256:fe87a796693f677ad1e91f19236731b97c6a5c8c8f1f1728613441132f42eed9
3scale-amp2/apicast-rhel7-operator@sha256:f44005ee79a0b309b06432343888ca6f9b962fb43ae3c49c7dad2978171bea4b
3scale-amp2/apicast-rhel7-operator-metadata@sha256:fe0e88d5db8ea354d24be5eb94957d9535d9df99a4fcbf45953b4ce72032d932
3scale-amp2/backend-rhel8@sha256:2819c736f97270fcb96498c7303ea2b3e11857a4cc5cd1e2d6bfbf47b50b1f77
3scale-amp2/memcached-rhel7@sha256:2852270a1824597c12a1134d010a2db47cde20347365145d970fa0a4b36ebc43
3scale-amp2/searchd-rhel7@sha256:21e486c6fc55116a90c7d913f978f43075d154db746bbe7adc9a8fb980544e17
3scale-amp2/system-rhel7@sha256:0d5c1e8becc1f3b17660e3b0edce7a69fd2bd33e09d5a372f60eb34107e19795
3scale-amp2/toolbox-rhel8@sha256:8d8872e798f4a83184ef92574126008368d4945daa48e3b6c68ae3a5a595901e
3scale-amp2/zync-rhel9@sha256:d54a87fa3c86e7e664d7e5a09b866c14ccb934455378e32747b0b41c8bf467cf

x86_64

3scale-amp2/3scale-auth-wasm-rhel8@sha256:f630cbfda55c5ccaffef81122a0e4cf24e24d7bfb1642eead22c938ca0ffa76a
3scale-amp2/3scale-rhel7-operator@sha256:4180093b6f6fd38542b2a122d838a22d250d2258766d6a20dd7cb1b00c6e7608
3scale-amp2/3scale-rhel7-operator-metadata@sha256:53f34cda12e9e32e29a76d35b4be77a40a5b61bdff89337dd4a564402351bd24
3scale-amp2/apicast-gateway-rhel8@sha256:2d40298d0960b1c18c4f9379a884720c2c79f14bc01694d70193af621272b713
3scale-amp2/apicast-rhel7-operator@sha256:caf1be4ab09a074029af9100414a3756aa480251bbfbee79b91480e8682e77d3
3scale-amp2/apicast-rhel7-operator-metadata@sha256:81d4fe1308d0ee0aad5323418aef48dd2ea082591c8b14b64e8a37ee70b42554
3scale-amp2/backend-rhel8@sha256:36e4b12158e39d0e27ac68b453b18d4cb9bfc845dc7cbeb8f027a13b2d4bfa0f
3scale-amp2/memcached-rhel7@sha256:d2c013ca01a88b20f5739f77d9996d858fb3c95c8c743512c7412e28a681da87
3scale-amp2/searchd-rhel7@sha256:0347f8aa3ade3794b2b58b91f6cf2932ee8d5dcd71c3ed152125c374b35e3065
3scale-amp2/system-rhel7@sha256:abb9b0430585d18fe120a765ebdee8f0fee09b4cea2a169525d2cf831be77f80
3scale-amp2/toolbox-rhel8@sha256:e1e949b55de720759f04b5b6f738a6b5c401770e3e021bd28aeb314a033f1f76
3scale-amp2/zync-rhel9@sha256:f53aa2760cc6fc50222c70ffabb0a916c01792dc7b4abebcdb6ff075baaee73a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility