- Issued:
- 2024-09-18
- Updated:
- 2024-09-18
RHSA-2024:6755 - Important: Red Hat OpenShift Data Foundation 4.16.2 security and bug fix update
Synopsis
Important: Red Hat OpenShift Data Foundation 4.16.2 security and bug fix update
Type/Severity
Security Advisory Important
Topic
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.16.2 on Red Hat Enterprise Linux 9 from Red Hat Container Registry.
Description
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multi-cloud data management service with an S3 compatible API.
Bug fixes:
-
Previously, when the label on the node was empty, the mount would fail. With this fix, when the node label is empty, the node is not considered for
crush_locationmount option and as a result persistent volume claim (PVC) mounts successfully. (BZ#2303177) -
Previously, after the OpenShift Data Foundation upgrade, the backingstore was stuck with "Connecting" status. With this fix, the location of the
upgrade_bucket_policyscript is corrected. (BZ#2303414)
All users of Red Hat OpenShift Data Foundation are advised to upgrade to these updated images, which provide these bug fixes.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Data Foundation | 4 | x86_64 |
| Red Hat OpenShift Data Foundation for RHEL 9 ARM | 4 | aarch64 |
| Red Hat OpenShift Data Foundation for IBM Z and LinuxONE | 4 | s390x |
| Red Hat OpenShift Data Foundation for IBM Power, little endian | 4 | ppc64le |
Fixes
- This content is not included.BZ - 2266006
- This content is not included.BZ - 2268820
- This content is not included.BZ - 2270863
- This content is not included.BZ - 2290526
- This content is not included.BZ - 2290675
- This content is not included.BZ - 2292668
- This content is not included.BZ - 2292777
- This content is not included.BZ - 2293200
- This content is not included.BZ - 2294000
- This content is not included.BZ - 2300022
- This content is not included.BZ - 2300289
- This content is not included.BZ - 2300332
- This content is not included.BZ - 2300499
- This content is not included.BZ - 2303177
- This content is not included.BZ - 2303414
- This content is not included.BZ - 2304074
- This content is not included.BZ - 2309710
- This content is not included.BZ - 2310210
CVEs
- CVE-2023-37920
- CVE-2023-39325
- CVE-2023-45290
- CVE-2024-1737
- CVE-2024-1975
- CVE-2024-2398
- CVE-2024-4076
- CVE-2024-6104
- CVE-2024-6345
- CVE-2024-6923
- CVE-2024-24789
- CVE-2024-24790
- CVE-2024-28176
- CVE-2024-28863
- CVE-2024-29180
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-37890
- CVE-2024-37891
- CVE-2024-38428
- CVE-2024-41818
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.