- 发布:
- 2024-11-14
- 已更新:
- 2024-11-14
RHEA-2024:9639 - Product Enhancement Advisory
概述
Red Hat 3scale API Management 2.15.0 Release - Container Images
类型/严重性
Product Enhancement Advisory
标题
Red Hat 3scale API Management 2.15.0 Release - Container Images
描述
Release of 3scale API Management components provides these changes:
解决方案
Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.14/html-single/installing_3scale/index
受影响的产品
- Red Hat 3scale API Management Platform 2 for RHEL 8 x86_64
- Red Hat 3scale API Management Platform 2 for RHEL 8 s390x
- Red Hat 3scale API Management Platform 2 for RHEL 8 ppc64le
- Red Hat 3scale API Management Platform 2 for RHEL 7 x86_64
- Red Hat 3scale API Management Platform 2 for RHEL 7 s390x
- Red Hat 3scale API Management Platform 2 for RHEL 7 ppc64le
修复
- THREESCALE-10719 - Community Builds of 3scale and APICast Operators
- THREESCALE-10670 - Request to update Default APIManager components compute resources on system-searchd
- THREESCALE-11224 - Sync 2.15 operator image version with CSV bundle version
- THREESCALE-11061 - Add support for Redis logical DBs in async mode
- THREESCALE-11230 - Apicast Operator keep operator version in sync with 3scale operator
- THREESCALE-11231 - Support Grafana V5 in the 3scale Operator
- THREESCALE-11338 - system-app-pre job can not be created when rwx storage is used
- THREESCALE-11344 - PodMonitors are not updated correctly in upgrade
- THREESCALE-9315 - Deploy backend in async mode
CVE
- CVE-2021-46984
- CVE-2021-47097
- CVE-2021-47101
- CVE-2021-47287
- CVE-2021-47289
- CVE-2021-47321
- CVE-2021-47338
- CVE-2021-47352
- CVE-2021-47383
- CVE-2021-47384
- CVE-2021-47385
- CVE-2021-47386
- CVE-2021-47393
- CVE-2021-47412
- CVE-2021-47432
- CVE-2021-47441
- CVE-2021-47455
- CVE-2021-47466
- CVE-2021-47497
- CVE-2021-47527
- CVE-2021-47560
- CVE-2021-47582
- CVE-2021-47609
- CVE-2022-48619
- CVE-2022-48754
- CVE-2022-48760
- CVE-2022-48804
- CVE-2022-48836
- CVE-2022-48866
- CVE-2023-6040
- CVE-2023-37920
- CVE-2023-52463
- CVE-2023-52470
- CVE-2023-52476
- CVE-2023-52478
- CVE-2023-52522
- CVE-2023-52605
- CVE-2023-52683
- CVE-2023-52798
- CVE-2023-52800
- CVE-2023-52801
- CVE-2023-52809
- CVE-2023-52817
- CVE-2023-52840
- CVE-2024-2398
- CVE-2024-6119
- CVE-2024-6345
- CVE-2024-6409
- CVE-2024-6923
- CVE-2024-7348
- CVE-2024-23848
- CVE-2024-26595
- CVE-2024-26600
- CVE-2024-26629
- CVE-2024-26630
- CVE-2024-26638
- CVE-2024-26645
- CVE-2024-26649
- CVE-2024-26665
- CVE-2024-26717
- CVE-2024-26720
- CVE-2024-26769
- CVE-2024-26846
- CVE-2024-26855
- CVE-2024-26880
- CVE-2024-26886
- CVE-2024-26894
- CVE-2024-26923
- CVE-2024-26939
- CVE-2024-26946
- CVE-2024-27013
- CVE-2024-27042
- CVE-2024-30203
- CVE-2024-30205
- CVE-2024-34397
- CVE-2024-35791
- CVE-2024-35797
- CVE-2024-35809
- CVE-2024-35875
- CVE-2024-35877
- CVE-2024-35884
- CVE-2024-35944
- CVE-2024-35989
- CVE-2024-36000
- CVE-2024-36019
- CVE-2024-36883
- CVE-2024-36901
- CVE-2024-36902
- CVE-2024-36919
- CVE-2024-36920
- CVE-2024-36922
- CVE-2024-36939
- CVE-2024-36953
- CVE-2024-36979
- CVE-2024-37356
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-37891
- CVE-2024-38428
- CVE-2024-38558
- CVE-2024-38559
- CVE-2024-38570
- CVE-2024-38579
- CVE-2024-38581
- CVE-2024-38619
- CVE-2024-39331
- CVE-2024-39471
- CVE-2024-39499
- CVE-2024-39501
- CVE-2024-39506
- CVE-2024-40901
- CVE-2024-40904
- CVE-2024-40911
- CVE-2024-40912
- CVE-2024-40927
- CVE-2024-40929
- CVE-2024-40931
- CVE-2024-40936
- CVE-2024-40941
- CVE-2024-40954
- CVE-2024-40958
- CVE-2024-40959
- CVE-2024-40960
- CVE-2024-40972
- CVE-2024-40977
- CVE-2024-40978
- CVE-2024-40988
- CVE-2024-40989
- CVE-2024-40995
- CVE-2024-40997
- CVE-2024-40998
- CVE-2024-41005
- CVE-2024-41007
- CVE-2024-41008
- CVE-2024-41012
- CVE-2024-41013
- CVE-2024-41014
- CVE-2024-41023
- CVE-2024-41035
- CVE-2024-41038
- CVE-2024-41039
- CVE-2024-41040
- CVE-2024-41041
- CVE-2024-41044
- CVE-2024-41055
- CVE-2024-41056
- CVE-2024-41060
- CVE-2024-41064
- CVE-2024-41065
- CVE-2024-41071
- CVE-2024-41073
- CVE-2024-41076
- CVE-2024-41090
- CVE-2024-41091
- CVE-2024-41096
- CVE-2024-41097
- CVE-2024-42082
- CVE-2024-42084
- CVE-2024-42090
- CVE-2024-42094
- CVE-2024-42096
- CVE-2024-42102
- CVE-2024-42114
- CVE-2024-42124
- CVE-2024-42131
- CVE-2024-42152
- CVE-2024-42154
- CVE-2024-42225
- CVE-2024-42226
- CVE-2024-42228
- CVE-2024-42237
- CVE-2024-42238
- CVE-2024-42240
- CVE-2024-42246
- CVE-2024-42265
- CVE-2024-42322
- CVE-2024-43830
- CVE-2024-43871
- CVE-2024-45490
- CVE-2024-45491
- CVE-2024-45492
参考
(none)
aarch64
3scale-amp2/3scale-apicast-operator-bundle@sha256:ebeb522aaaf267e69724cdf8defc0da1f0657547a5c73def6681dc5c8504cbce |
3scale-amp2/apicast-gateway-rhel8@sha256:5a7554078f7805c6c002f5c3d8390486c7e6b82eaf8ad600cd446913a9cc8319 |
3scale-amp2/apicast-rhel9-operator@sha256:4a713808a2c0e9f3a982f86572b52fe749ad1c95f5c74a2c6e226825b1bd9b98 |
ppc64le
3scale-amp2/3scale-apicast-operator-bundle@sha256:92b8c7e68f5a9ac5ce63e722b5560c95406d5a1c1f0def10b6ef1b5c8f72abab |
3scale-amp2/3scale-auth-wasm-rhel8@sha256:a93b31eb880dc2078e15e2cbf469419690f00c4323589a8af333c929deb72aa6 |
3scale-amp2/3scale-operator-bundle@sha256:9511a4854934b6499cac8a7b067b19c8a96d2b259891c30f6de2e3ecd46ea2da |
3scale-amp2/3scale-rhel9-operator@sha256:7c1878cdca6706ba13c30de97149813e0b70b3d800d4ea189d07907a30debdd5 |
3scale-amp2/apicast-gateway-rhel8@sha256:607db744d4a97f28b4e766b2a532cc7c674094cc8033ed68d62520883f7ce2d4 |
3scale-amp2/apicast-rhel9-operator@sha256:c5ef4a40941d361469fadf6cf2bcc85b766df50c05dc0d7f56534741cd0c63c2 |
3scale-amp2/backend-rhel8@sha256:90fed104a9094fe3fec247c114c06a47d2f55f57c5dd822fc2c2df61ea651479 |
3scale-amp2/manticore-rhel9@sha256:5a55d264efa2cd26b867255addba2b81c4c2affbe89693b7d594a01b48ab4d27 |
3scale-amp2/memcached-rhel7@sha256:6e3de6ee887d61b3b15a0ea0092d186969222e2131b3b2d473f6378e73fd4c2a |
3scale-amp2/system-rhel8@sha256:457806fd54ea4b86f9164aef9e4b7e5b29122ba9e9812e68c78cf5b03f02177c |
3scale-amp2/toolbox-rhel9@sha256:c6e58083003087757a56528c096486a7b77785d9b6fe59ee72aa8e0b16c920d0 |
3scale-amp2/zync-rhel9@sha256:6b178e9257fb0e11e52c9d306898893166030522ed1d75d51fd6eb813f71f6ef |
s390x
3scale-amp2/3scale-apicast-operator-bundle@sha256:ae05c4be192f9cbe1587a1b7d9b8d1303468fe318e380bd2a8181564559288a2 |
3scale-amp2/3scale-operator-bundle@sha256:a357778759c3aeb4f3963c84591341425c939a66ab818e57f4ae2ae7c6eb7bb7 |
3scale-amp2/3scale-rhel9-operator@sha256:2b5ea2222106f5728e95189b2216bb3a81ee49682af959364255fee61c91a354 |
3scale-amp2/apicast-gateway-rhel8@sha256:856fdd2b606c02db8b52f70224429c3e9fcfb3fd74d48c5c984da2b43556e200 |
3scale-amp2/apicast-rhel9-operator@sha256:940014cfe9582d2ec243db563ae0f336cc30729878eea719446f645580739c18 |
3scale-amp2/backend-rhel8@sha256:868f851752caa3a006725d9d6a37e75e50cd0866e956d45b2bc416db1762eb2e |
3scale-amp2/manticore-rhel9@sha256:1db7456fd5c1f961ecb9fa7ba86a81c2af2bf2e3e938a68c28f3aee23bca5ebd |
3scale-amp2/memcached-rhel7@sha256:7b9142c36bb3ef7fd722f46c2eb90bbc9e30c58981d1c58ab83e5daf3e0e9257 |
3scale-amp2/system-rhel8@sha256:556c9b430b47d27427e6029bc8af40c5a61dbc90e837914ca44a7fa5892d311c |
3scale-amp2/toolbox-rhel9@sha256:2c04c52f55f6c8e63c7536b620e85ff8d2e6abd418db2337cfd5caaf478edb64 |
3scale-amp2/zync-rhel9@sha256:8decd67d31247b386bc621a1334c3f5ab98ea743df5a26a52edbc1525d3ce999 |
x86_64
3scale-amp2/3scale-apicast-operator-bundle@sha256:aae1d2eb7bf87de1f9b7f553cbfac382df6f4c4f8a61adadd710bfe988efdf5e |
3scale-amp2/3scale-auth-wasm-rhel8@sha256:ae1a14ea21dc20f0ce4b4c04a4f597ace9bd82057e4c019715fd47f06e96e057 |
3scale-amp2/3scale-operator-bundle@sha256:8fe76f66454f4b3dfd0ad4b392c9fb55ffd0e68529d73adf2d7798212faf9fc5 |
3scale-amp2/3scale-rhel9-operator@sha256:b152363a5307528d182590b359f1f553bd9003bd579b7cd72535b6990b7fe5cb |
3scale-amp2/apicast-gateway-rhel8@sha256:36c838435112469911c2e3905b9cc9267ca7887fa9b4fda819a39939cc1b2d01 |
3scale-amp2/apicast-rhel9-operator@sha256:699448efaadcc25633dd6c6bedac2dd22d5645fbebf902f02a0a34138ec7c015 |
3scale-amp2/backend-rhel8@sha256:07c3687749ccd5315ad4e73785515a2929b7fea50fea0e58798a8227f9353ffd |
3scale-amp2/manticore-rhel9@sha256:db484706b5e513c51e6696a8696f7dd38a2dd91fb771ca9c6cbbdba4ab6971e8 |
3scale-amp2/memcached-rhel7@sha256:18d31f45afe5c5dcc81ac372cbb79ff3238e13e75e5a8289027ff468993c1775 |
3scale-amp2/system-rhel8@sha256:fc855e5803a523bec95f364213e1a37c60ac6465b7dde5a5b4d36781018c0c4c |
3scale-amp2/toolbox-rhel9@sha256:e18229b27c364594c17542a052ae1165a7a316f662f49e5805e9f621be4268cd |
3scale-amp2/zync-rhel9@sha256:8ceaf2dcc70a82b65bd50ebc8798c6e8090fe3f732de9496c488fd4967b78754 |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。