- Issued:
- 2024-08-08
- Updated:
- 2024-08-08
RHBA-2024:5120 - Bug Fix Advisory
Synopsis
RHOAI 2.8.4 - Red Hat OpenShift AI
Type/Severity
Bug Fix Advisory
Topic
Updated images are now available for Red Hat OpenShift AI.
Description
Release of RHOAI 2.8.4 provides these changes:
Solution
For Red Hat OpenShift AI 2.8.4 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://access.redhat.com/documentation/en-us/red_hat_openshift_ai/2024
Affected Products
- Red Hat OpenShift AI 2 x86_64
Fixes
- RHOAIENG-9257 - [2.8.z] CVE-2024-5480 PyTorch fails to verify RPC calls
- RHOAIENG-8314 - [2.8.z] BuildConfig definition for RStudio image points to wrong branch
- RHOAIENG-8739 - [CI] backport CI checks to rhoai-2.8 branch
- RHOAIENG-10270 - Inference is failing for 4.8.6 models with new tgis image
- RHOAIENG-10292 - BYOM models pod on cpd 4.8.6 fails to come with new TGIS images (rhoai-2.8-8f1658e) due to permission denied error.
CVEs
- CVE-2020-26555
- CVE-2021-46909
- CVE-2021-46972
- CVE-2021-47069
- CVE-2021-47073
- CVE-2021-47236
- CVE-2021-47310
- CVE-2021-47311
- CVE-2021-47353
- CVE-2021-47356
- CVE-2021-47456
- CVE-2021-47495
- CVE-2022-48624
- CVE-2023-2953
- CVE-2023-5090
- CVE-2023-52464
- CVE-2023-52560
- CVE-2023-52615
- CVE-2023-52626
- CVE-2023-52667
- CVE-2023-52669
- CVE-2023-52675
- CVE-2023-52686
- CVE-2023-52700
- CVE-2023-52703
- CVE-2023-52781
- CVE-2023-52813
- CVE-2023-52835
- CVE-2023-52877
- CVE-2023-52878
- CVE-2023-52881
- CVE-2024-3651
- CVE-2024-21131
- CVE-2024-21138
- CVE-2024-21140
- CVE-2024-21145
- CVE-2024-21147
- CVE-2024-24806
- CVE-2024-25062
- CVE-2024-26583
- CVE-2024-26584
- CVE-2024-26585
- CVE-2024-26656
- CVE-2024-26675
- CVE-2024-26735
- CVE-2024-26759
- CVE-2024-26801
- CVE-2024-26804
- CVE-2024-26826
- CVE-2024-26859
- CVE-2024-26906
- CVE-2024-26907
- CVE-2024-26974
- CVE-2024-26982
- CVE-2024-27397
- CVE-2024-27410
- CVE-2024-28182
- CVE-2024-32002
- CVE-2024-32004
- CVE-2024-32020
- CVE-2024-32021
- CVE-2024-32465
- CVE-2024-32487
- CVE-2024-35235
- CVE-2024-35789
- CVE-2024-35835
- CVE-2024-35838
- CVE-2024-35845
- CVE-2024-35852
- CVE-2024-35853
- CVE-2024-35854
- CVE-2024-35855
- CVE-2024-35888
- CVE-2024-35890
- CVE-2024-35958
- CVE-2024-35959
- CVE-2024-35960
- CVE-2024-36004
- CVE-2024-36007
References
(none)
x86_64
rhoai/odh-codeflare-operator-rhel8@sha256:fd4cd4ecd2fd160909e0c5d6b709bfd0aa1a9539a19fda5b7904269200f156a1 |
rhoai/odh-dashboard-rhel8@sha256:32f4c54abd25af61b7a0f3fbb7f9774b3bf57014865caa54ecdcb3de7524f356 |
rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:6efc9fe656eb6599efd56d218e136682f987b6e0200e2562c7feb95059f7ef70 |
rhoai/odh-kf-notebook-controller-rhel8@sha256:861357cf746479c969f103c5041e2be035cf3328f662b20997ccaf550647aefd |
rhoai/odh-kuberay-operator-controller-rhel8@sha256:304b9b735eb32b003ff9565e7c7ffe70ca62f5fb6868257b7484252944e1a9a5 |
rhoai/odh-kueue-controller-rhel8@sha256:6eaf81dc0ed2cdd3d99eaded8db3d963bb500bdf52bcf0e62dd43497a9c8562e |
rhoai/odh-ml-pipelines-api-server-rhel8@sha256:b1d720c84a899ac354b8ceec85acdbe5783f3133249535f63606c34e20c2c349 |
rhoai/odh-ml-pipelines-artifact-manager-rhel8@sha256:9e8724a7b6511d629532fdb62e18ec347c511dfbaa421d5e4bb7dbfa66433a87 |
rhoai/odh-ml-pipelines-cache-rhel8@sha256:d743286973ff6d2302e9a46d77dd0259dceef38877caf93637becbf5e2340e22 |
rhoai/odh-ml-pipelines-persistenceagent-rhel8@sha256:f0392caf0902601c425554ebaea6ebb8e910557a9679ee68e7393729bd7962ef |
rhoai/odh-ml-pipelines-scheduledworkflow-rhel8@sha256:ecb12906948680b5bd1e027765e5c1aaee678d662f375d7e9a7283d3c100918c |
rhoai/odh-mm-rest-proxy-rhel8@sha256:60966b0733cb0c932f2ae803f08db05e71d9ed1f594a4100221c423b5a83f40b |
rhoai/odh-model-controller-rhel8@sha256:2564ca41af12ac357fb292ecafb63741b88545357a4a789fd54f94c7dfe58ffa |
rhoai/odh-modelmesh-rhel8@sha256:da5debadfbe6d64a384499ffb6c2a7823bdec0eebc35134c8dc74edbd66f5eed |
rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:fcf41b8ef586dac4431d253b1618fba72822313b43a04d753caa9fa3ef30f468 |
rhoai/odh-modelmesh-serving-controller-rhel8@sha256:dad49d96f29992e76e7cfdfade5b58050a76507311c15c5e75f9c2a8a95da23a |
rhoai/odh-notebook-controller-rhel8@sha256:da7e975eddda914b98f4b01ae74523565184078ef6b931fb0025297fcc792b67 |
rhoai/odh-operator-bundle@sha256:cb711fcb32b5ca0f34c4e3c67624bc4e035de4247617d988a9e841fd58c1c911 |
rhoai/odh-rhel8-operator@sha256:fbf6c4f546128f63fd3370bfd6befa075ae902f66dbfff023ca7687c93af2e59 |
rhoai/odh-trustyai-service-operator-rhel8@sha256:870e8f221efbaa008132276fa04b4a744a09665326678f04048ebcc2b4e64c77 |
rhoai/odh-trustyai-service-rhel8@sha256:0243fa12482a3d330e546a2eb7d133e1b0fbc936d9ba0913c31bc9d738fb4aa4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.