- Issued:
- 2023-07-13
- Updated:
- 2023-07-13
RHBA-2023:3630 - Bug Fix Advisory
Synopsis
OpenShift Compliance Operator bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
An updated OpenShift Compliance Operator image that fixes various bugs and adds new enhancements is now available for the Red Hat OpenShift Enterprise 4 catalog.
Description
The OpenShift Compliance Operator v1.1.0 is now available. See the documentation for bug fix information:
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to:
https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html
Affected Products
- Red Hat OpenShift Container Platform 4.12 for RHEL 8 x86_64
Fixes
- OCPBUGS-10473 - The instructions for some stig rules are missing
- OCPBUGS-11334 - The scan result for rule ocp4-kubelet-enable-protect-kernel-sysctl does not align with the instructions
- OCPBUGS-6875 - Compliance Operator profiles don't differentiate application/operating system profiles in the docs
- OCPBUGS-7307 - Instruction is not available for some MANUAL rules
- OCPBUGS-7816 - After auto remediation applied, rule rhcos4-sshd-set-loglevel-info still getting FAIL for rhcos4-e8 profile
- OCPBUGS-8347 - OpenShift fails scheduler-no-bind-address Compliance Rule
- OCPBUGS-7983 - Failed to scan for hypershift guest cluster due to api-checks-pod crashed
CVEs
References
(none)
ppc64le
compliance/openshift-compliance-content-rhel8@sha256:3e84f64ee466e1d57ad77f648fa190a256fb315449c6c4ac0093f40df6fe1efe |
compliance/openshift-compliance-openscap-rhel8@sha256:5d58a578356b7e2f6cc8194d904466f46bae6b0fdbff353700be41cd44742419 |
compliance/openshift-compliance-rhel8-operator@sha256:db2b422ab1bf6d4e3416903f2a63f4a3ff2e458516d1545f58a2126d960e7f2b |
s390x
compliance/openshift-compliance-content-rhel8@sha256:bf2dbd584aeab13e9ac2c9cb0fed4e9e6c2650319eef1c31a5a346fd811d628f |
compliance/openshift-compliance-openscap-rhel8@sha256:71bf1ca83ce51d9a70e25867b558fdfd49dbb8a452e8b85b8c0dfdb4b5410f2d |
compliance/openshift-compliance-rhel8-operator@sha256:57c0c29f94fa0b6cd14a3cb8fe262d2b19bc9972ca1f5ef7399077467dec37d0 |
x86_64
compliance/openshift-compliance-content-rhel8@sha256:176d915f631c9b69194928824bd4a3a06b85a3dceffd8ce68db8b93649c47b3f |
compliance/openshift-compliance-openscap-rhel8@sha256:38932dee770a7ae5fe002e59878050c7e8d1d6c809d120aa6c4732475700b33b |
compliance/openshift-compliance-operator-bundle@sha256:42661f4571fc520f08ea3c4854f36e01829c40e83c356b982a4115564a538baa |
compliance/openshift-compliance-rhel8-operator@sha256:6393e1a3440731e2bb3876291fc12551f867fa01ee37083a1e616f4a4e845886 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.