A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server. | |
| Title | Mirror-registry: remote code execution using pickle deserialization | |
| First Time appeared |
Redhat
Redhat mirror Registry Redhat quay |
|
| Weaknesses | CWE-502 | |
| CPEs | cpe:/a:redhat:mirror_registry:1 cpe:/a:redhat:mirror_registry:2 cpe:/a:redhat:quay:3 |
|
| Vendors & Products |
Redhat
Redhat mirror Registry Redhat quay |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-08T17:04:22.870Z
Reserved: 2026-03-12T14:39:53.657Z
Link: CVE-2026-32590
No data.
Status : Received
Published: 2026-04-08T18:25:59.947
Modified: 2026-04-08T18:25:59.947
Link: CVE-2026-32590
No data.
OpenCVE Enrichment
No data.
Weaknesses