- Issued:
- 2023-11-27
- Updated:
- 2023-11-27
RHBA-2023:7492 - Bug Fix Advisory
Synopsis
RHODS 2.4 - Red Hat OpenShift Data Science
Type/Severity
Bug Fix Advisory
Topic
Updated images are now available for Red Hat OpenShift Data Science.
Description
Release of RHODS 2.4 provides these changes:
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat OpenShift AI 2 x86_64
Fixes
- FAI-982 - Implement saliency for time series
- FAI-983 - Implement FourierMMD metric
- FAI-984 - Implement KS and Approximate KS Test drift algorithms
- RHODS-12782 - Github Issues for Component Dashboard for release rhods-2.4
- RHODS-12783 - Github Issues for Component Data Science Pipelines for release rhods-2.4
- RHODS-12784 - Github Issues for Component RHODS Operator for release rhods-2.4
- RHODS-12785 - Github Issues for Component Model Serving for release rhods-2.4
- RHODS-12787 - Github Issues for Component Distributed Workloads for release rhods-2.4
- RHODS-12786 - Github Issues for Component Workbenches for release rhods-2.4
- RHODS-2 - Create demo of CI/CD pipeline as a recorded video
- RHODS-12834 - "Would you like to receive official Jupyter news?" pop-up in Jupyter notebooks
- RHODS-12860 - CVE-2023-44487 DOS affecting operator-lifecycle-manager-server package, versions <0.26.0
- RHODS-4050 - Query {job="RHODS Metrics"} in Prometheus does not return anything
CVEs
- CVE-2007-4559
- CVE-2020-24736
- CVE-2021-43975
- CVE-2022-3594
- CVE-2022-3640
- CVE-2022-4744
- CVE-2022-28388
- CVE-2022-36227
- CVE-2022-38457
- CVE-2022-40133
- CVE-2022-40982
- CVE-2022-41862
- CVE-2022-42895
- CVE-2022-42898
- CVE-2022-45869
- CVE-2022-45887
- CVE-2022-48337
- CVE-2022-48339
- CVE-2023-0458
- CVE-2023-0590
- CVE-2023-0597
- CVE-2023-0800
- CVE-2023-0801
- CVE-2023-0802
- CVE-2023-0803
- CVE-2023-0804
- CVE-2023-1073
- CVE-2023-1074
- CVE-2023-1075
- CVE-2023-1079
- CVE-2023-1118
- CVE-2023-1206
- CVE-2023-1252
- CVE-2023-1382
- CVE-2023-1667
- CVE-2023-1855
- CVE-2023-1981
- CVE-2023-1989
- CVE-2023-1998
- CVE-2023-2269
- CVE-2023-2283
- CVE-2023-2513
- CVE-2023-2602
- CVE-2023-2603
- CVE-2023-3138
- CVE-2023-3141
- CVE-2023-3161
- CVE-2023-3212
- CVE-2023-3268
- CVE-2023-3609
- CVE-2023-3611
- CVE-2023-3772
- CVE-2023-4016
- CVE-2023-4128
- CVE-2023-4132
- CVE-2023-4155
- CVE-2023-4206
- CVE-2023-4207
- CVE-2023-4208
- CVE-2023-4527
- CVE-2023-4641
- CVE-2023-4732
- CVE-2023-4806
- CVE-2023-4813
- CVE-2023-4911
- CVE-2023-22025
- CVE-2023-22081
- CVE-2023-22745
- CVE-2023-23455
- CVE-2023-26545
- CVE-2023-27536
- CVE-2023-28321
- CVE-2023-28328
- CVE-2023-28484
- CVE-2023-28772
- CVE-2023-29469
- CVE-2023-29491
- CVE-2023-30456
- CVE-2023-31084
- CVE-2023-31436
- CVE-2023-31486
- CVE-2023-32324
- CVE-2023-33203
- CVE-2023-33951
- CVE-2023-33952
- CVE-2023-34241
- CVE-2023-35823
- CVE-2023-35824
- CVE-2023-35825
- CVE-2023-40217
- CVE-2023-44487
- CVE-2023-51043
- CVE-2024-0443
References
(none)
x86_64
rhods/odh-codeflare-operator-rhel8@sha256:dd14914e92bde9e834b5b806e296ed210e9e45c1e71d3ca8d07492a967e41646 |
rhods/odh-dashboard-rhel8@sha256:4fb3e19665921164a9e3efbb83da2493af197e9511198bec2ef26be458bbe4af |
rhods/odh-data-science-pipelines-operator-controller-rhel8@sha256:4f1511effdf68329a092cc8de8879b99e6b412fe5e54dac78c0d1702cbe22615 |
rhods/odh-kf-notebook-controller-rhel8@sha256:18bdde1e5d61663b56fad3135d046ab29d45ddde030059d2332dbe08f33baa22 |
rhods/odh-kuberay-operator-controller-rhel8@sha256:6031c4b0cd16ad69e8ddffa27850797f2fcbed37453dc5eadcfc51fddd4fe16e |
rhods/odh-ml-pipelines-api-server-rhel8@sha256:e93464874ea15a531ded124b911ef31f8f7eaa4a714e61b793ce4fcc70465dba |
rhods/odh-ml-pipelines-artifact-manager-rhel8@sha256:3ad91b1853e45873885fdd8dcde094e5c0712a4ea93f2bf30c415c4153710e22 |
rhods/odh-ml-pipelines-cache-rhel8@sha256:d8d6dade3fff4d7312d86226534279638fc981865394a75986bf1a7ff72752f4 |
rhods/odh-ml-pipelines-persistenceagent-rhel8@sha256:e543aaee276a4571c3a06505b0007ae2a435848dd417ee8e47b54481106f119f |
rhods/odh-ml-pipelines-scheduledworkflow-rhel8@sha256:75a02edd646967593afd87f874bb207b22529af22b9e98be27781007186fe886 |
rhods/odh-mm-rest-proxy-rhel8@sha256:b3c796a289fb12ac59ce60e75a4266045bf071e91a022ba5a9c935f077df602d |
rhods/odh-model-controller-rhel8@sha256:9808224f80f414b8af05cbfb1a6f3a292077d35ac1f403534c505f5bede517c5 |
rhods/odh-modelmesh-rhel8@sha256:d7605432021879d043f95602b77bc99804211e0e240628fd4fb285550df61fbc |
rhods/odh-modelmesh-runtime-adapter-rhel8@sha256:f99fb510544a7e72137e48f0dca08949159786658ed8a3b3b74cc1d132fd1d35 |
rhods/odh-modelmesh-serving-controller-rhel8@sha256:0f60f7523db4bf6c18bf69984e56ce632ceb1f0b4e868e73ef653b43e5034f75 |
rhods/odh-notebook-controller-rhel8@sha256:19daaa5932e1297efc469eae97f0b7f1fb4b652d44aa828e3d3bcf5e9dfdc9b4 |
rhods/odh-operator-base-rhel8@sha256:e33814ce6b42423bb9a8237c6a4b5f58bbbd9239b8335f3fca85ad86fdc39a37 |
rhods/odh-operator-bundle@sha256:b637a02d23bd8364cc8914421049eb60169c163ac70bff2f33591df1a1193002 |
rhods/odh-rhel8-operator@sha256:00d56a2984ee01fa81cbe838567e448ce8acced37f7ff919e6e50cf951082ef2 |
rhods/odh-trustyai-service-operator-rhel8@sha256:c6a5d496f39aa30dbc90dee4cb81f6e54d1db3c8d388315b78782d631c5746ca |
rhods/odh-trustyai-service-rhel8@sha256:77d74af5cd5819cee3341505a3d329fbf622ad892df67faa85f4e6a40ccc6322 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.