- Issued:
- 2019-10-03
- Updated:
- 2019-10-03
RHSA-2019:2966 - Important: Red Hat Quay v3.1.1 security update
Synopsis
Important: Red Hat Quay v3.1.1 security update
Type/Severity
Security Advisory Important
Topic
Updated Quay packages that fix several bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Quay 3.1.1 errata release, including:
Security Fix(es):
-
HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
-
HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
-
HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)
-
HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
-
HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Fixed repository mirror credentials properly escaped to allow special characters
- Fixed repository mirror UI cancel button enabled
- Fixed repository mirror UI change next sync date
Solution
Please download the release images via:
quay.io/redhat/quay:v3.1.1 quay.io/redhat/clair-jwt:v3.1.1 quay.io/redhat/quay-builder:v3.1.1
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Quay Enterprise | 3 | x86_64 |
Fixes
- This content is not included.BZ - 1735645
- This content is not included.BZ - 1735741
- This content is not included.BZ - 1735744
- This content is not included.BZ - 1741860
- This content is not included.BZ - 1741864
- This content is not included.BZ - 1750473
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.