- Issued:
- 2024-12-17
- Updated:
- 2024-12-17
RHSA-2024:11292 - Low: Red Hat OpenShift Data Foundation 4.16.4 security and bug fix update
Synopsis
Low: Red Hat OpenShift Data Foundation 4.16.4 security and bug fix update
Type/Severity
Security Advisory Low
Topic
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.16.4 on Red Hat Enterprise Linux 9 from Red Hat Container Registry.
Description
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multi-cloud data management service with an S3 compatible API.
Security Fix(es):
- cross-spawn: regular expression denial of service (CVE-2024-21538)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug fixes:
Previously, the PrometheusDuplicateTimestamps warning was seen in Prometheus that indicated that metrics with same timestamp but with different values are encountered. This was because the nodejs report generated default metrics that overlapped with those from the core report. With this fix, a new regisry is created to collect all the default metrics of nodejs and hence resolving the warning.
Previously, Ceph S3 object stores in OpenShift Data Foundation external mode needed to rotate certificates each time the RADOS Gateway (RGW) rotated. With this fix, well-known certificate authorities (CAs) are used to attempt the authentication of Ceph RGW daemons. The well-known CAs are determined based on Red Hat base container image’s certificates’ RPM package. This enables OpenShift Data Foundation to continue to operate in a healthy status.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Data Foundation | 4 | x86_64 |
| Red Hat OpenShift Data Foundation for RHEL 9 ARM | 4 | aarch64 |
| Red Hat OpenShift Data Foundation for IBM Z and LinuxONE | 4 | s390x |
| Red Hat OpenShift Data Foundation for IBM Power, little endian | 4 | ppc64le |
Fixes
- This content is not included.BZ - 2324550
- This content is not included.DFBUGS-835
- This content is not included.DFBUGS-697
- This content is not included.DFBUGS-532
- This content is not included.DFBUGS-445
- This content is not included.DFBUGS-444
- This content is not included.DFBUGS-279
- This content is not included.DFBUGS-168
CVEs
- CVE-2021-3903
- CVE-2024-2236
- CVE-2024-2511
- CVE-2024-3596
- CVE-2024-4603
- CVE-2024-4741
- CVE-2024-5535
- CVE-2024-6232
- CVE-2024-9675
- CVE-2024-9676
- CVE-2024-10963
- CVE-2024-21538
- CVE-2024-34064
- CVE-2024-34155
- CVE-2024-34156
- CVE-2024-34158
- CVE-2024-50602
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.