- Issued:
- 2024-01-11
- Updated:
- 2024-01-11
RHBA-2024:0147 - Bug Fix Advisory
Synopsis
OpenShift sandboxed containers 1.5.1 update
Type/Severity
Bug Fix Advisory
Topic
OpenShift sandboxed containers 1.5.1 is now available.
Description
OpenShift sandboxed containers support for OpenShift Container Platform
provides users with built-in support for running Kata containers as an
additional, optional runtime.
This advisory contains an update for OpenShift sandboxed containers with bug fixes and container upgrades.
Space precludes documenting all of the updates to OpenShift sandboxed
containers in this advisory. See the Release Notes documentation,
which will be updated shortly for this release, for details about these
changes:
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat OpenShift Container Platform 4.13 for RHEL 9 x86_64
Fixes
- KATA-2632 - Bump versions in downstream CSV for 1.5.1 release
- KATA-2583 - podvm setup-nat-for-imds.service is failing on AWS
- KATA-2593 - Kata Operator upgrade failed 1.4.1 to 1.5.0
- KATA-2635 - Update bundle to match upstream 1.5.1 kataconfig CRD
- KATA-2636 - "replaces" field in downstream CSV is bogus
CVEs
(none)
References
(none)
s390x
openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:d681f39eb922dca2cf30b68d342fbf4d25ec0430ea3cc509f3b669c9b388698e |
openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:d70735b599de7b32cd5f7f0909ecdd2c1c5f945cff8eb6dac729fbf62b48a29b |
openshift-sandboxed-containers/osc-monitor-rhel9@sha256:7444aa108b638a6e58c68885d3e4c3409c8844c1e613547dbddb8013da50e425 |
openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:3963ce898e930ebb4e8a4e34e1820d914fb4464317e7c17f5a82337dd08c2c66 |
openshift-sandboxed-containers/osc-operator-bundle@sha256:94d39aa5a41bddbcd911bb14fe7238abfcdd42733307532485c5c1d8b0b6010c |
openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:f11e4c4634bcc8ade47547ee1ef6479db69a11facf9070b65df65156bfacd961 |
openshift-sandboxed-containers/osc-rhel9-operator@sha256:3e92b1628164d5afec8cc9ab3a929fdbe24ec2564e32f845e0dabe9fcf0ff963 |
x86_64
openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:a9d0dbac259810e37235af571a7c35a4a11cedbda1b3e280b75fcb3f82348dd0 |
openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:c72871812c0336eba4cdf5a4807c26109ea5d57e503b815c17eeb39b0db437eb |
openshift-sandboxed-containers/osc-monitor-rhel9@sha256:bebc858da8f719e8cdb517c5f7f9bd70fe4268590cc0c06ae09c67902a40537e |
openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:1793fe6982dd351654ad04ff3fa39cad9d5f7a922514acb9f6630c6f0133f600 |
openshift-sandboxed-containers/osc-operator-bundle@sha256:3e1f6c1b475783a9c40fa75a77e4ba5192f042dda225f0288333849a7457a810 |
openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:9d7c29d7f689d597038247aa7982b900780828b3b87ac945ed58e9fab5fafd2d |
openshift-sandboxed-containers/osc-rhel9-operator@sha256:77042a5e483074e484815e608bbb34ea33ad859c524fdddf558ac9724ae98ee3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.