First published: Thu Nov 30 2023(Updated: )
An update is now available for Red Hat Quay 3.<br>Security Fix(es):<br><li> python-werkzeug: high resource usage when parsing multipart form data with many fields (CVE-2023-25577)</li> <li> flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header (CVE-2023-30861)</li> <li> python-cryptography: memory corruption via immutable objects (CVE-2023-23931)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quay | ||
Red Hat Quay | ||
Red Hat Quay for IBM Z and LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:7341 is high.
The update is an important security update for Red Hat Quay.
Red Hat Quay, Red Hat Quay for IBM Power, little endian, and Red Hat Quay for IBM Z and LinuxONE are affected.
You can find more information about RHSA-2023:7341 on the Red Hat website.
You can apply the security update by following the instructions provided by Red Hat.