- Issued:
- 2024-06-13
- Updated:
- 2024-06-13
RHBA-2024:3930 - Bug Fix Advisory
Synopsis
RHOAI 2.8.3 - Red Hat OpenShift AI
Type/Severity
Bug Fix Advisory
Topic
Updated images are now available for Red Hat OpenShift AI.
Description
Release of RHOAI 2.8.3 provides these changes:
Solution
For Red Hat OpenShift AI 2.8.3 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://access.redhat.com/documentation/en-us/red_hat_openshift_ai/2024
Affected Products
- Red Hat OpenShift AI 2 x86_64
Fixes
- RHOAIENG-8393 - [2.8.3] Can't install RHOAI without dashboard component
- RHOAIENG-8271 - Fix grade C issue for artifact manager image in Cpaas (RHOAI 2.8.3)
- RHOAIENG-8261 - [2.8.3] Building RStudio workbench image fails
- RHOAIENG-3052 - Develop Prometheus Queries for KServe OVMS
- RHOAIENG-3378 - [2.8.3] Internal Image Registry is an undeclared hard dependency for Jupyter Notebooks Spawn process
- RHOAIENG-6817 - [2.8.z] trusted-ca volume is not mounted while creating the first workbench
- RHOAIENG-7932 - [2.8.z] Internal Image Registry Dependency Removal
- RHOAIENG-8099 - kserve storage-initializer fails to start because of broken ray import in RHOAI 2.8.3
- RHOAIENG-6839 - Update TGIS Image for 2.8.3 to include mlp and attn bias option for flash and paged llama models
- RHOAIENG-7503 - [upstream-tracker] make container builder configurable for modelmesh-runtime-adapter
- RHOAIENG-8171 - [2.8.3] Fix metadata.managedFields must be nil error in DSC
CVEs
- CVE-2019-25162
- CVE-2020-15778
- CVE-2020-36777
- CVE-2021-43618
- CVE-2021-46934
- CVE-2021-47013
- CVE-2021-47055
- CVE-2021-47118
- CVE-2021-47153
- CVE-2021-47171
- CVE-2021-47185
- CVE-2022-4645
- CVE-2022-48627
- CVE-2022-48669
- CVE-2023-3446
- CVE-2023-3817
- CVE-2023-5678
- CVE-2023-6004
- CVE-2023-6240
- CVE-2023-6597
- CVE-2023-6918
- CVE-2023-7008
- CVE-2023-7104
- CVE-2023-43785
- CVE-2023-43786
- CVE-2023-43787
- CVE-2023-43788
- CVE-2023-43789
- CVE-2023-52439
- CVE-2023-52445
- CVE-2023-52477
- CVE-2023-52513
- CVE-2023-52520
- CVE-2023-52528
- CVE-2023-52565
- CVE-2023-52578
- CVE-2023-52594
- CVE-2023-52595
- CVE-2023-52598
- CVE-2023-52606
- CVE-2023-52607
- CVE-2023-52610
- CVE-2024-0340
- CVE-2024-0450
- CVE-2024-22365
- CVE-2024-23307
- CVE-2024-25062
- CVE-2024-25744
- CVE-2024-26458
- CVE-2024-26461
- CVE-2024-26593
- CVE-2024-26603
- CVE-2024-26610
- CVE-2024-26615
- CVE-2024-26642
- CVE-2024-26643
- CVE-2024-26659
- CVE-2024-26664
- CVE-2024-26693
- CVE-2024-26694
- CVE-2024-26743
- CVE-2024-26744
- CVE-2024-26779
- CVE-2024-26872
- CVE-2024-26892
- CVE-2024-26897
- CVE-2024-26901
- CVE-2024-26919
- CVE-2024-26933
- CVE-2024-26934
- CVE-2024-26964
- CVE-2024-26973
- CVE-2024-26993
- CVE-2024-27014
- CVE-2024-27048
- CVE-2024-27052
- CVE-2024-27056
- CVE-2024-27059
- CVE-2024-28834
- CVE-2024-33599
- CVE-2024-33600
- CVE-2024-33601
- CVE-2024-33602
References
(none)
x86_64
rhoai/odh-codeflare-operator-rhel8@sha256:cd3611e9202fcd94bba1fbae6b70a920d339280802ab5710904c6468b9a3533a |
rhoai/odh-dashboard-rhel8@sha256:965cc9fb3649c9a0481d51946c5ff8e4a16c183c23258ae89b4373350b4e8731 |
rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:7bc373b917c3240016afd841b1d17d9fab0958be312e805d0b5ac720f0d21123 |
rhoai/odh-kf-notebook-controller-rhel8@sha256:c83a6afb1da9f8258b65fa5ec8efee88c59a647fe61f2edc2b3936d2ced0f08e |
rhoai/odh-kuberay-operator-controller-rhel8@sha256:a63be0289168939a39ea064358b08131d01a7c46841cb57cc2dfe840b5bdb3a8 |
rhoai/odh-kueue-controller-rhel8@sha256:ad3c20351ea893c67f505a2aea36cf4ecbbbef20a44ddafe27dfe46c895ab5bc |
rhoai/odh-ml-pipelines-api-server-rhel8@sha256:eabbbef9ca46ed5d6db0dae83993cb55f79788bd77d0174f97bd817f8b63fce5 |
rhoai/odh-ml-pipelines-artifact-manager-rhel8@sha256:e72c27a7165b53513bc3f13faf2014edda64f2caf682bb2568719d7a4fb56666 |
rhoai/odh-ml-pipelines-cache-rhel8@sha256:065a281dd04d81871ff475157ad76298e29d42f022cf85dd39f0416abeb02dd8 |
rhoai/odh-ml-pipelines-persistenceagent-rhel8@sha256:4991a7b3819af61d4064c7a21df4bebca27cba8d0243afd8cdcb507e99223bd4 |
rhoai/odh-ml-pipelines-scheduledworkflow-rhel8@sha256:b2fa773e5279dd9dafedd79506263884e89806cdbd05ce5c79bd0fa36190d550 |
rhoai/odh-mm-rest-proxy-rhel8@sha256:d23fcf2ee161ffd5239f46f8870d6f612ccfee95bf3aaa59bf4e8e8c51a94913 |
rhoai/odh-model-controller-rhel8@sha256:b7a74f4301d232afce8fb833ba486fe4269a1d4adeb9f8865f2bac7137c9ffee |
rhoai/odh-modelmesh-rhel8@sha256:ba4daf566cb8b64c15a1716db901e122497456bb33950b9653c87ea31cb99876 |
rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:5e01dc9b310cc344d20a5aa62c04d6bfb3fb2ff135b6582db10209a3e6b70be9 |
rhoai/odh-modelmesh-serving-controller-rhel8@sha256:dbc98b18f12d5300d3a14ef0b4330e3528050baec40e0a2c0bec4f1f1bafb5bb |
rhoai/odh-notebook-controller-rhel8@sha256:32611699d0987816fd27adea43355923f4e9410a1f1fc17d086172114eb87691 |
rhoai/odh-operator-bundle@sha256:3f8ad1085aeb45513994255539a501ff92a103ea66a80c37ae05d9c478fa769d |
rhoai/odh-rhel8-operator@sha256:fdff9ea92df8dc7643c107a78a0eac68f8f447e12fa18fcc405e0a0eb7f868b0 |
rhoai/odh-trustyai-service-operator-rhel8@sha256:45d89492271530e3bc0e834d0b5ace56c3c1a802613eb1f69ee210cfb7f80530 |
rhoai/odh-trustyai-service-rhel8@sha256:15076276a199aadce7e86c1524b53aacd50084cf088aa6392aa9efa26378d9a7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.