- Issued:
- 2024-01-04
- Updated:
- 2024-01-04
RHBA-2023:7658 - Bug Fix Advisory
Synopsis
OpenShift Compliance Operator bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
An updated OpenShift Compliance Operator image that fixes various bugs and adds new enhancements is now available for the Red Hat OpenShift Enterprise 4 catalog.
Description
The OpenShift Compliance Operator v1.4.0 is now available. See the documentation for bug fix information:
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to:
Affected Products
- Red Hat OpenShift Container Platform 4.13 for RHEL 9 x86_64
- Red Hat OpenShift Container Platform 4.12 for RHEL 8 x86_64
Fixes
- CMP-2123 - Suspend and resume scans
- CMP-2125 - Design and implement profile versioning in Profile CRD
- CMP-2126 - Design and implement profile names in ComplianceRules
- CMP-2310 - Clean up CronJob compatibility code
- OCPBUGS-17494 - Compliance Operator rprivate default mount propagation in combination with `hostPath: path: /` volume mounts of pods created breaks CSI driver relying on multipath
- OCPBUGS-8041 - Remediations get stuck in a loop when derived from check results with INFO status
- OCPBUGS-24594 - Rule rhcos4-audit-rules-login-events-faillock will fail even after auto-remediation applied
- OCPBUGS-25323 - Ovs rules not available in scans for profile ocp4-cis-node for compliance-operator.v1.4.0
CVEs
References
(none)
ppc64le
compliance/openshift-compliance-content-rhel8@sha256:4a45a05a0f6c64889ed10ccc8f5906345fcddc7ec41865e524598891771b27aa |
compliance/openshift-compliance-openscap-rhel8@sha256:03fab00ca4ebb6fc504c67b4314e0911b74c9774a4ce9f87730768cb060021de |
compliance/openshift-compliance-rhel8-operator@sha256:589cad5528a6a72f1b2411b8df15745a97e81471f7e54aea665cf1f42f963b82 |
s390x
compliance/openshift-compliance-content-rhel8@sha256:c9efb23b74bc82f0cfa87a61a17b0bcdf8462507d6bcdba1d461f4b215646606 |
compliance/openshift-compliance-openscap-rhel8@sha256:d5e38b567aea246bd44b6e9685033a393e418733064f688066b003c2dd57d8b1 |
compliance/openshift-compliance-rhel8-operator@sha256:22bf99739802a178601ade160693cd92e830ca51406f1df4123d097ff1ab392a |
x86_64
compliance/openshift-compliance-content-rhel8@sha256:9e3cae3318f4fd9cf6ab1293637008b36f02558012f72f631fbc15b35febe18b |
compliance/openshift-compliance-openscap-rhel8@sha256:9f8cab5f905d20524bb184734fbdd10e23cb5c582fb3b3c9c9727d810ad06dc1 |
compliance/openshift-compliance-operator-bundle@sha256:f176e3a1ca1c77fb285bae8d9009a91abf310363eed4fc79a778b7306a38e480 |
compliance/openshift-compliance-rhel8-operator@sha256:fdcfaf684f617c1a3cf6394e0220dc81b0f9b2311a7736dcfe2e68b82088a739 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.