- Issued:
- 2023-08-21
- Updated:
- 2023-08-21
RHBA-2023:4245 - Bug Fix Advisory
Synopsis
OpenShift Compliance Operator enhancement update
Type/Severity
Bug Fix Advisory
Topic
An updated OpenShift Compliance Operator image that adds new enhancements is now available for the Red Hat OpenShift Enterprise 4 catalog.
Description
The OpenShift Compliance Operator v1.2.0 is now available. See the documentation for bug fix information:
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to:
https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html
Affected Products
- Red Hat OpenShift Container Platform 4.13 for RHEL 9 x86_64
- Red Hat OpenShift Container Platform 4.12 for RHEL 8 x86_64
Fixes
- CMP-1559 - Update OpenShift CIS benchmark to version 1.4.0
- OCPBUGS-10508 - For ocp4-cis-scc-limit-container-allowed-capabilities please provide additional commands to help identify non compliant SCCs
- OCPBUGS-11696 - api-server-encryption related rules should not fail when aesgcm encryption type was applied
- OCPBUGS-16727 - Rule ocp4-cis-kubelet-configure-event-creation will fail by default for 4.14
- OCPBUGS-16877 - Rule ocp4-file-permissions-etcd-member should not get a false negative scan result for a 4.14 nightly payload
- OCPBUGS-17216 - CIS Rule RotateKubeletServerCertificate uses an invalid check on 4.14
CVEs
References
(none)
ppc64le
compliance/openshift-compliance-content-rhel8@sha256:4a8266ccaa735d593253fb7dcc298fe59cbbc774e7f0be9dc74d7170b377aa97 |
compliance/openshift-compliance-openscap-rhel8@sha256:a3bb28aebbcedd1e47a68f42467df155d65faed538931936a25fe0846973d82b |
compliance/openshift-compliance-rhel8-operator@sha256:747f33ac6e2dad21f15dc559f90968f2d3e1171c2d520c07d7f517b725ce1a9f |
s390x
compliance/openshift-compliance-content-rhel8@sha256:b0cc1e28047c8843aa14f543ac3ac5547de1865c97e60bcdd11f74840575d413 |
compliance/openshift-compliance-openscap-rhel8@sha256:4056e6fc23d23382c1b2c9006e994d5ed5900b74785161e54ba1b1a6e1ae3003 |
compliance/openshift-compliance-rhel8-operator@sha256:b51ec8c3c00a0fe20785fd4fc7a1fa9024bf6501bf0a9fb1ec681d6517ac0436 |
x86_64
compliance/openshift-compliance-content-rhel8@sha256:981e792e65a41e267c47d7bcddbadbed74dbb5828b68319611e937a095713b10 |
compliance/openshift-compliance-openscap-rhel8@sha256:477fb44c4b4fa3b82aa089151763defb624fcd771402ecda19255623f932f9e0 |
compliance/openshift-compliance-operator-bundle@sha256:fae844681e2be92b3d02bdfae12a51c4f37e8088bdbccbd259fbb9a90553931b |
compliance/openshift-compliance-rhel8-operator@sha256:d27141ddf990c23cffd18ce998776728079422ff58f62cdafc712212a917315e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.