Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2024:8413 - Bug Fix Advisory
Issued:
2024-10-24
Updated:
2024-10-24

RHBA-2024:8413 - Bug Fix Advisory

  • Overview
  • Updated Images

Synopsis

RHOAI 2.13.1 - Red Hat OpenShift AI

Type/Severity

Bug Fix Advisory

Topic

Updated images are now available for Red Hat OpenShift AI.

Description

Release of RHOAI 2.13.1 provides these changes:

Solution

For Red Hat OpenShift AI 2.13.1 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:

https://docs.redhat.com/en/documentation/red_hat_openshift_ai/

Affected Products

  • Red Hat OpenShift AI 2 x86_64

Fixes

  • RHOAIENG-14523 - [2.13.z] Wrong default value set for serverless certification
  • RHOAIENG-14534 - vllm: vllm-tgis-adapter install overriding vllm install

CVEs

  • CVE-2021-46984
  • CVE-2021-47097
  • CVE-2021-47101
  • CVE-2021-47287
  • CVE-2021-47289
  • CVE-2021-47321
  • CVE-2021-47338
  • CVE-2021-47352
  • CVE-2021-47383
  • CVE-2021-47384
  • CVE-2021-47385
  • CVE-2021-47386
  • CVE-2021-47393
  • CVE-2021-47412
  • CVE-2021-47432
  • CVE-2021-47441
  • CVE-2021-47455
  • CVE-2021-47466
  • CVE-2021-47497
  • CVE-2021-47527
  • CVE-2021-47560
  • CVE-2021-47582
  • CVE-2021-47609
  • CVE-2022-48619
  • CVE-2022-48754
  • CVE-2022-48760
  • CVE-2022-48804
  • CVE-2022-48836
  • CVE-2022-48866
  • CVE-2023-6040
  • CVE-2023-37920
  • CVE-2023-52470
  • CVE-2023-52476
  • CVE-2023-52478
  • CVE-2023-52522
  • CVE-2023-52605
  • CVE-2023-52683
  • CVE-2023-52798
  • CVE-2023-52800
  • CVE-2023-52809
  • CVE-2023-52817
  • CVE-2023-52840
  • CVE-2024-4032
  • CVE-2024-5535
  • CVE-2024-6232
  • CVE-2024-6923
  • CVE-2024-23848
  • CVE-2024-26595
  • CVE-2024-26600
  • CVE-2024-26638
  • CVE-2024-26645
  • CVE-2024-26649
  • CVE-2024-26665
  • CVE-2024-26717
  • CVE-2024-26720
  • CVE-2024-26769
  • CVE-2024-26846
  • CVE-2024-26855
  • CVE-2024-26880
  • CVE-2024-26894
  • CVE-2024-26923
  • CVE-2024-26939
  • CVE-2024-27013
  • CVE-2024-27042
  • CVE-2024-30203
  • CVE-2024-30205
  • CVE-2024-35809
  • CVE-2024-35877
  • CVE-2024-35884
  • CVE-2024-35944
  • CVE-2024-35989
  • CVE-2024-36883
  • CVE-2024-36901
  • CVE-2024-36902
  • CVE-2024-36919
  • CVE-2024-36920
  • CVE-2024-36922
  • CVE-2024-36939
  • CVE-2024-36953
  • CVE-2024-37356
  • CVE-2024-38558
  • CVE-2024-38559
  • CVE-2024-38570
  • CVE-2024-38579
  • CVE-2024-38581
  • CVE-2024-38619
  • CVE-2024-39331
  • CVE-2024-39471
  • CVE-2024-39499
  • CVE-2024-39501
  • CVE-2024-39506
  • CVE-2024-40901
  • CVE-2024-40904
  • CVE-2024-40911
  • CVE-2024-40912
  • CVE-2024-40929
  • CVE-2024-40931
  • CVE-2024-40941
  • CVE-2024-40954
  • CVE-2024-40958
  • CVE-2024-40959
  • CVE-2024-40960
  • CVE-2024-40972
  • CVE-2024-40977
  • CVE-2024-40978
  • CVE-2024-40988
  • CVE-2024-40989
  • CVE-2024-40995
  • CVE-2024-40997
  • CVE-2024-40998
  • CVE-2024-41005
  • CVE-2024-41007
  • CVE-2024-41008
  • CVE-2024-41012
  • CVE-2024-41013
  • CVE-2024-41014
  • CVE-2024-41023
  • CVE-2024-41035
  • CVE-2024-41038
  • CVE-2024-41039
  • CVE-2024-41040
  • CVE-2024-41041
  • CVE-2024-41044
  • CVE-2024-41055
  • CVE-2024-41056
  • CVE-2024-41060
  • CVE-2024-41064
  • CVE-2024-41065
  • CVE-2024-41071
  • CVE-2024-41076
  • CVE-2024-41090
  • CVE-2024-41091
  • CVE-2024-41097
  • CVE-2024-42084
  • CVE-2024-42090
  • CVE-2024-42094
  • CVE-2024-42096
  • CVE-2024-42114
  • CVE-2024-42124
  • CVE-2024-42131
  • CVE-2024-42152
  • CVE-2024-42154
  • CVE-2024-42225
  • CVE-2024-42226
  • CVE-2024-42228
  • CVE-2024-42237
  • CVE-2024-42238
  • CVE-2024-42240
  • CVE-2024-42246
  • CVE-2024-42265
  • CVE-2024-42322
  • CVE-2024-43830
  • CVE-2024-43871
  • CVE-2024-45490
  • CVE-2024-45491
  • CVE-2024-45492

References

(none)

x86_64

rhoai/odh-codeflare-operator-rhel8@sha256:f1b836e8e5eb2e7bd732700fe42323ce06749cd9a46ce773df5eda1fa7dc026a
rhoai/odh-dashboard-rhel8@sha256:afe7564e9bd929797cd418512827c8565b8e49379294db2ba79788db9df1e9d0
rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:80d130ef052663ddcc4e1c88726ea624c8f8a3478f8c6dafdced0dd525bf0f89
rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:fa83d29bccd2a155e7f2eac03741f5aac7c4d2a6cf57283481a9bda7451d754a
rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:50dabb31740e94a4e706e86b5148a14c38d20148a7c45cc3596c6bbfdd72c396
rhoai/odh-kf-notebook-controller-rhel8@sha256:1d64333a7d11557f6e44536a223ef51dac5ff4b4bc541dec2822c2e63989455a
rhoai/odh-kuberay-operator-controller-rhel8@sha256:25b4366e2bd6cdabc23fabce25efd4a471965f557ee1495c2f3dc482afc158c1
rhoai/odh-kueue-controller-rhel8@sha256:30b10b69b3ebd6aefdb1b675ae1662a9d93cc5566ea50aa1d4eff2ddbb2d6fe5
rhoai/odh-ml-pipelines-api-server-rhel8@sha256:de432f88fa7272e423980b0b5fd17556519a883fb5cd6ab5f79b0630d9a814b2
rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:c327f27be586cf079c263d672eaf81e04e2218bdd86cac8a1d29272cea8a2785
rhoai/odh-ml-pipelines-artifact-manager-rhel8@sha256:029b9a9a255086fbe6c5d1ee2988f621ad6a5e39e1101c5fc857baa4b5e7134f
rhoai/odh-ml-pipelines-cache-rhel8@sha256:63beb8b8aacf6b9227495cf38ae0e1db636464c25b10bb9bc3107a25e113c4b6
rhoai/odh-ml-pipelines-driver-rhel8@sha256:e877f5b0e9762793f6a3db9b5414bd2b00b0d60a1efc700b63929d9f6dacc7d3
rhoai/odh-ml-pipelines-launcher-rhel8@sha256:9306e045b3712d6b02c29b867ff454828bb907018406d0e9f197b3ad5f2d4f3b
rhoai/odh-ml-pipelines-persistenceagent-rhel8@sha256:807602da33433e97035bd572622ef82cfc6340a0964b1e2691cc85bd4a5927da
rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:03a035917fb752a6764f4b0df6887c2ca82b818a6ef1034db316afe7df85b3bf
rhoai/odh-ml-pipelines-scheduledworkflow-rhel8@sha256:65679f09adb2c17f31e14f685d18f58b8d66b54aa4f84986432008adc06a28dd
rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:7e12c09fe0a0b4ee3270d6822288433ff4d2441cb2720131282595866cb3fc1c
rhoai/odh-mlmd-grpc-server-rhel8@sha256:ab9b4172279d2ab00dbaa853a701aa39196efc391547c8d00fb850fb6d518c07
rhoai/odh-mm-rest-proxy-rhel8@sha256:84e38a58b55a616414e2ab856b69038203a5b533794d705d2bb4a757c97b8868
rhoai/odh-model-controller-rhel8@sha256:f9dd6ba9b74986d0649b5c6cdbc74a25eb0022b26b0e760da6127ebe3e25b0c2
rhoai/odh-modelmesh-rhel8@sha256:eb29ca3c4329fbb9289e543c04a76e3e268dfe8e7363dc9ee944cb8797d907ef
rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:7a4796265bae25df034ca5a92b134de461a7abc0b49e0cdddb433b8538a7264e
rhoai/odh-modelmesh-serving-controller-rhel8@sha256:4d02160fde2a67a78280d4106e60ea64977a5ab37a74b13106815e778c67e77a
rhoai/odh-notebook-controller-rhel8@sha256:6a7e3bb638503f1c0aeedacee4ee9408e3d251dc27135a14693dd547ec0b50d8
rhoai/odh-operator-bundle@sha256:e1c19bbcd4c010ef2bd4f760eb24b2c96cdb82b4e025361a433e6a241eb23cf5
rhoai/odh-rhel8-operator@sha256:edf957902dca261f33a22e06886151dc5ad09b1f0f7345c644320c0c2ba1b173
rhoai/odh-training-operator-rhel8@sha256:832b1d6e93837b11065d3206e155d34acfba2416adef6eec952d8d76998c0d56
rhoai/odh-trustyai-service-operator-rhel8@sha256:a44395156ccf4c2b3f75d331be11d45e1d73c8bc63d77b69ff3c1a70d8122a6c
rhoai/odh-trustyai-service-rhel8@sha256:6dfe112a17e64fbec117d326ccccebf37ab4e12877cd2f9e0307d94bcc9478b1

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility