Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2024:6814 - Bug Fix Advisory
Issued:
2024-09-19
Updated:
2024-09-19

RHBA-2024:6814 - Bug Fix Advisory

  • Overview
  • Updated Images

Synopsis

RHOAI 2.10.1 - Red Hat OpenShift AI

Type/Severity

Bug Fix Advisory

Topic

Updated images are now available for Red Hat OpenShift AI.

Description

Release of RHOAI 2.10.1 provides these changes:

Solution

For Red Hat OpenShift AI 2.10.1 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:

https://docs.redhat.com/documentation/en-us/red_hat_openshift_ai/

Affected Products

  • Red Hat OpenShift AI 2 x86_64

Fixes

  • RHOAIENG-13021 - Release 2.10.1: restore CHI grade

CVEs

  • CVE-2018-15209
  • CVE-2021-46939
  • CVE-2021-47018
  • CVE-2021-47257
  • CVE-2021-47284
  • CVE-2021-47304
  • CVE-2021-47373
  • CVE-2021-47408
  • CVE-2021-47461
  • CVE-2021-47468
  • CVE-2021-47491
  • CVE-2021-47548
  • CVE-2021-47579
  • CVE-2021-47624
  • CVE-2022-48624
  • CVE-2022-48632
  • CVE-2022-48743
  • CVE-2022-48747
  • CVE-2022-48757
  • CVE-2023-2953
  • CVE-2023-6228
  • CVE-2023-25433
  • CVE-2023-28746
  • CVE-2023-52356
  • CVE-2023-52451
  • CVE-2023-52463
  • CVE-2023-52469
  • CVE-2023-52471
  • CVE-2023-52486
  • CVE-2023-52530
  • CVE-2023-52619
  • CVE-2023-52622
  • CVE-2023-52623
  • CVE-2023-52648
  • CVE-2023-52653
  • CVE-2023-52658
  • CVE-2023-52662
  • CVE-2023-52679
  • CVE-2023-52707
  • CVE-2023-52730
  • CVE-2023-52756
  • CVE-2023-52762
  • CVE-2023-52764
  • CVE-2023-52775
  • CVE-2023-52777
  • CVE-2023-52784
  • CVE-2023-52791
  • CVE-2023-52796
  • CVE-2023-52803
  • CVE-2023-52811
  • CVE-2023-52832
  • CVE-2023-52834
  • CVE-2023-52845
  • CVE-2023-52847
  • CVE-2023-52864
  • CVE-2024-2201
  • CVE-2024-2398
  • CVE-2024-3651
  • CVE-2024-6345
  • CVE-2024-21131
  • CVE-2024-21138
  • CVE-2024-21140
  • CVE-2024-21145
  • CVE-2024-21147
  • CVE-2024-21823
  • CVE-2024-24806
  • CVE-2024-25739
  • CVE-2024-26586
  • CVE-2024-26614
  • CVE-2024-26640
  • CVE-2024-26660
  • CVE-2024-26669
  • CVE-2024-26686
  • CVE-2024-26698
  • CVE-2024-26704
  • CVE-2024-26733
  • CVE-2024-26740
  • CVE-2024-26772
  • CVE-2024-26773
  • CVE-2024-26802
  • CVE-2024-26810
  • CVE-2024-26837
  • CVE-2024-26840
  • CVE-2024-26843
  • CVE-2024-26852
  • CVE-2024-26853
  • CVE-2024-26870
  • CVE-2024-26878
  • CVE-2024-26908
  • CVE-2024-26921
  • CVE-2024-26925
  • CVE-2024-26940
  • CVE-2024-26958
  • CVE-2024-26960
  • CVE-2024-26961
  • CVE-2024-27010
  • CVE-2024-27011
  • CVE-2024-27019
  • CVE-2024-27020
  • CVE-2024-27025
  • CVE-2024-27065
  • CVE-2024-27388
  • CVE-2024-27395
  • CVE-2024-27434
  • CVE-2024-28182
  • CVE-2024-31076
  • CVE-2024-32002
  • CVE-2024-32004
  • CVE-2024-32020
  • CVE-2024-32021
  • CVE-2024-32465
  • CVE-2024-32487
  • CVE-2024-33621
  • CVE-2024-35235
  • CVE-2024-35790
  • CVE-2024-35801
  • CVE-2024-35807
  • CVE-2024-35810
  • CVE-2024-35814
  • CVE-2024-35823
  • CVE-2024-35824
  • CVE-2024-35847
  • CVE-2024-35876
  • CVE-2024-35893
  • CVE-2024-35896
  • CVE-2024-35897
  • CVE-2024-35899
  • CVE-2024-35900
  • CVE-2024-35910
  • CVE-2024-35912
  • CVE-2024-35924
  • CVE-2024-35925
  • CVE-2024-35930
  • CVE-2024-35937
  • CVE-2024-35938
  • CVE-2024-35946
  • CVE-2024-35947
  • CVE-2024-35952
  • CVE-2024-35962
  • CVE-2024-36000
  • CVE-2024-36005
  • CVE-2024-36006
  • CVE-2024-36010
  • CVE-2024-36016
  • CVE-2024-36017
  • CVE-2024-36020
  • CVE-2024-36025
  • CVE-2024-36270
  • CVE-2024-36286
  • CVE-2024-36489
  • CVE-2024-36886
  • CVE-2024-36889
  • CVE-2024-36896
  • CVE-2024-36904
  • CVE-2024-36905
  • CVE-2024-36917
  • CVE-2024-36921
  • CVE-2024-36924
  • CVE-2024-36927
  • CVE-2024-36929
  • CVE-2024-36933
  • CVE-2024-36940
  • CVE-2024-36941
  • CVE-2024-36945
  • CVE-2024-36950
  • CVE-2024-36952
  • CVE-2024-36954
  • CVE-2024-36960
  • CVE-2024-36971
  • CVE-2024-36978
  • CVE-2024-36979
  • CVE-2024-37370
  • CVE-2024-37371
  • CVE-2024-37891
  • CVE-2024-38428
  • CVE-2024-38538
  • CVE-2024-38555
  • CVE-2024-38573
  • CVE-2024-38575
  • CVE-2024-38596
  • CVE-2024-38598
  • CVE-2024-38615
  • CVE-2024-38627
  • CVE-2024-39276
  • CVE-2024-39472
  • CVE-2024-39476
  • CVE-2024-39487
  • CVE-2024-39502
  • CVE-2024-40927
  • CVE-2024-40974

References

(none)

x86_64

rhoai/odh-codeflare-operator-rhel8@sha256:92cb65f6252cb6df5f8c461c5ba19759ec7649edf2b14ccae827e9ed50101b9c
rhoai/odh-dashboard-rhel8@sha256:357c9e1f8a73421e29b3eb5d1b2b11abed690abbb442d835bb642c1715b1d884
rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:a7268002ae02eed606a6867a5ed5861d239be0eed694a8e3b39461bc6daf4b9c
rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:1957404c45ef8e50c35fcabb882e53cc65ab19f1a04cbb043ae55ba4bb43c074
rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:6bbc2ff5feaab990e5db5621ca54ceba64ff4a17c4528ef65bcbe90b3353fb96
rhoai/odh-kf-notebook-controller-rhel8@sha256:0cc9c5ab6f89e7a0064ca5eb8ff3785011584b58c726353e5d85cc880ba41901
rhoai/odh-kuberay-operator-controller-rhel8@sha256:aae90c76269f087748e06246594dc7f5dad372f51827420bf3f87c8e83523ee9
rhoai/odh-kueue-controller-rhel8@sha256:e27408aa91b59952cca3bb684f6e9cc86d29526b457d04cd0efde2d75a2b7248
rhoai/odh-ml-pipelines-api-server-rhel8@sha256:81a1918ee184bd43049f98418e3da52f852616919a3ab6b4437c80bdd437fc76
rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:2b2026f6487f6f4a7790d5a325e60c38206bdcc2a0d88eff3729a8f6a744221b
rhoai/odh-ml-pipelines-artifact-manager-rhel8@sha256:1dc37a67799047ab91bdc81f4b83fb695b77b8c22b94798226da2650f40de943
rhoai/odh-ml-pipelines-cache-rhel8@sha256:9c0951452a3e6e09562c0c5bd38d6a1039ce6f6e67d0bea8e3c02b2d4d85d687
rhoai/odh-ml-pipelines-driver-rhel8@sha256:e89b27e84b72bb074bf1b74d353bf7939b10c31bf2932af7963b45394dc0bba3
rhoai/odh-ml-pipelines-launcher-rhel8@sha256:d59fa2e1c183e5ce8eda1c094f7e85745f23b6ecfa2e661f68b6638f25b26a30
rhoai/odh-ml-pipelines-persistenceagent-rhel8@sha256:ce20f38b1ed6dda7fc45f18ab55050b4330ae09df0bac20593d66de687f20fad
rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:967a21553b9084fb791e29fe4a0210be4743bae49dd77c4e339ef1c1208e1fe5
rhoai/odh-ml-pipelines-scheduledworkflow-rhel8@sha256:466d07cca90017849def4fe00988b17a697a4080c99fff662cc60577fc008865
rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:ad981f7147a021fa02bfb272656bca82a3a75c7f337b43fe475c7b2b1864fbdd
rhoai/odh-mlmd-grpc-server-rhel8@sha256:835525aed59a94d9bcc72b1dc18556b8c6a13646336e49e19e97a0b6a8fc751c
rhoai/odh-mm-rest-proxy-rhel8@sha256:558e5db6d50381c7ed6bae37ae1d6c771355ce91efc871db0dddee373db32180
rhoai/odh-model-controller-rhel8@sha256:bbbbb62b10b83d237ec5928802d8a65b018a483820d11dda26f39fb9adaabd3b
rhoai/odh-modelmesh-rhel8@sha256:3b98ca4623306674b53302b6a6492fe0caf4ec9d1bf24e81a9ca13d183bea1e6
rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:fc45539aca13eafcdbfcfaad72a7675e435d467225b4d94ed7eecc3edf26458f
rhoai/odh-modelmesh-serving-controller-rhel8@sha256:6cf6f736d699c1d9b88c56f04652b6e6152ddb656092d3e16972c0c4db0cde04
rhoai/odh-notebook-controller-rhel8@sha256:e8774d604fad8b59bf27a18b814774751bce9cd248e24d34e75382ec3a45c5dc
rhoai/odh-operator-bundle@sha256:b9282d90c77a034bc4c32b38d39f23ffa025fbe68414f0a3f98ca40b0f595290
rhoai/odh-rhel8-operator@sha256:cda2ee858a7875cc0540c312ed115a47ed07dd37bcf08e37b4e2518331535937
rhoai/odh-training-operator-rhel8@sha256:3e59f3f4467ee18d9c86b51cfe57d77db46dd48a68035244f8da62a2b09518e4
rhoai/odh-trustyai-service-operator-rhel8@sha256:fba3c8c4eba4638bc60e1f01916584742a250d308487e95d6986d5fcbaa43e96
rhoai/odh-trustyai-service-rhel8@sha256:e14bc55c14d736eb342d13263fc4dabf7052e921cb4805296377ef5b1d6d8132

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility