- Issued:
- 2024-10-24
- Updated:
- 2024-10-24
RHBA-2024:8413 - Bug Fix Advisory
Synopsis
RHOAI 2.13.1 - Red Hat OpenShift AI
Type/Severity
Bug Fix Advisory
Topic
Updated images are now available for Red Hat OpenShift AI.
Description
Release of RHOAI 2.13.1 provides these changes:
Solution
For Red Hat OpenShift AI 2.13.1 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://docs.redhat.com/en/documentation/red_hat_openshift_ai/
Affected Products
- Red Hat OpenShift AI 2 x86_64
Fixes
- RHOAIENG-14523 - [2.13.z] Wrong default value set for serverless certification
- RHOAIENG-14534 - vllm: vllm-tgis-adapter install overriding vllm install
CVEs
- CVE-2021-46984
- CVE-2021-47097
- CVE-2021-47101
- CVE-2021-47287
- CVE-2021-47289
- CVE-2021-47321
- CVE-2021-47338
- CVE-2021-47352
- CVE-2021-47383
- CVE-2021-47384
- CVE-2021-47385
- CVE-2021-47386
- CVE-2021-47393
- CVE-2021-47412
- CVE-2021-47432
- CVE-2021-47441
- CVE-2021-47455
- CVE-2021-47466
- CVE-2021-47497
- CVE-2021-47527
- CVE-2021-47560
- CVE-2021-47582
- CVE-2021-47609
- CVE-2022-48619
- CVE-2022-48754
- CVE-2022-48760
- CVE-2022-48804
- CVE-2022-48836
- CVE-2022-48866
- CVE-2023-6040
- CVE-2023-37920
- CVE-2023-52470
- CVE-2023-52476
- CVE-2023-52478
- CVE-2023-52522
- CVE-2023-52605
- CVE-2023-52683
- CVE-2023-52798
- CVE-2023-52800
- CVE-2023-52809
- CVE-2023-52817
- CVE-2023-52840
- CVE-2024-4032
- CVE-2024-5535
- CVE-2024-6232
- CVE-2024-6923
- CVE-2024-23848
- CVE-2024-26595
- CVE-2024-26600
- CVE-2024-26638
- CVE-2024-26645
- CVE-2024-26649
- CVE-2024-26665
- CVE-2024-26717
- CVE-2024-26720
- CVE-2024-26769
- CVE-2024-26846
- CVE-2024-26855
- CVE-2024-26880
- CVE-2024-26894
- CVE-2024-26923
- CVE-2024-26939
- CVE-2024-27013
- CVE-2024-27042
- CVE-2024-30203
- CVE-2024-30205
- CVE-2024-35809
- CVE-2024-35877
- CVE-2024-35884
- CVE-2024-35944
- CVE-2024-35989
- CVE-2024-36883
- CVE-2024-36901
- CVE-2024-36902
- CVE-2024-36919
- CVE-2024-36920
- CVE-2024-36922
- CVE-2024-36939
- CVE-2024-36953
- CVE-2024-37356
- CVE-2024-38558
- CVE-2024-38559
- CVE-2024-38570
- CVE-2024-38579
- CVE-2024-38581
- CVE-2024-38619
- CVE-2024-39331
- CVE-2024-39471
- CVE-2024-39499
- CVE-2024-39501
- CVE-2024-39506
- CVE-2024-40901
- CVE-2024-40904
- CVE-2024-40911
- CVE-2024-40912
- CVE-2024-40929
- CVE-2024-40931
- CVE-2024-40941
- CVE-2024-40954
- CVE-2024-40958
- CVE-2024-40959
- CVE-2024-40960
- CVE-2024-40972
- CVE-2024-40977
- CVE-2024-40978
- CVE-2024-40988
- CVE-2024-40989
- CVE-2024-40995
- CVE-2024-40997
- CVE-2024-40998
- CVE-2024-41005
- CVE-2024-41007
- CVE-2024-41008
- CVE-2024-41012
- CVE-2024-41013
- CVE-2024-41014
- CVE-2024-41023
- CVE-2024-41035
- CVE-2024-41038
- CVE-2024-41039
- CVE-2024-41040
- CVE-2024-41041
- CVE-2024-41044
- CVE-2024-41055
- CVE-2024-41056
- CVE-2024-41060
- CVE-2024-41064
- CVE-2024-41065
- CVE-2024-41071
- CVE-2024-41076
- CVE-2024-41090
- CVE-2024-41091
- CVE-2024-41097
- CVE-2024-42084
- CVE-2024-42090
- CVE-2024-42094
- CVE-2024-42096
- CVE-2024-42114
- CVE-2024-42124
- CVE-2024-42131
- CVE-2024-42152
- CVE-2024-42154
- CVE-2024-42225
- CVE-2024-42226
- CVE-2024-42228
- CVE-2024-42237
- CVE-2024-42238
- CVE-2024-42240
- CVE-2024-42246
- CVE-2024-42265
- CVE-2024-42322
- CVE-2024-43830
- CVE-2024-43871
- CVE-2024-45490
- CVE-2024-45491
- CVE-2024-45492
References
(none)
x86_64
rhoai/odh-codeflare-operator-rhel8@sha256:f1b836e8e5eb2e7bd732700fe42323ce06749cd9a46ce773df5eda1fa7dc026a |
rhoai/odh-dashboard-rhel8@sha256:afe7564e9bd929797cd418512827c8565b8e49379294db2ba79788db9df1e9d0 |
rhoai/odh-data-science-pipelines-argo-argoexec-rhel8@sha256:80d130ef052663ddcc4e1c88726ea624c8f8a3478f8c6dafdced0dd525bf0f89 |
rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8@sha256:fa83d29bccd2a155e7f2eac03741f5aac7c4d2a6cf57283481a9bda7451d754a |
rhoai/odh-data-science-pipelines-operator-controller-rhel8@sha256:50dabb31740e94a4e706e86b5148a14c38d20148a7c45cc3596c6bbfdd72c396 |
rhoai/odh-kf-notebook-controller-rhel8@sha256:1d64333a7d11557f6e44536a223ef51dac5ff4b4bc541dec2822c2e63989455a |
rhoai/odh-kuberay-operator-controller-rhel8@sha256:25b4366e2bd6cdabc23fabce25efd4a471965f557ee1495c2f3dc482afc158c1 |
rhoai/odh-kueue-controller-rhel8@sha256:30b10b69b3ebd6aefdb1b675ae1662a9d93cc5566ea50aa1d4eff2ddbb2d6fe5 |
rhoai/odh-ml-pipelines-api-server-rhel8@sha256:de432f88fa7272e423980b0b5fd17556519a883fb5cd6ab5f79b0630d9a814b2 |
rhoai/odh-ml-pipelines-api-server-v2-rhel8@sha256:c327f27be586cf079c263d672eaf81e04e2218bdd86cac8a1d29272cea8a2785 |
rhoai/odh-ml-pipelines-artifact-manager-rhel8@sha256:029b9a9a255086fbe6c5d1ee2988f621ad6a5e39e1101c5fc857baa4b5e7134f |
rhoai/odh-ml-pipelines-cache-rhel8@sha256:63beb8b8aacf6b9227495cf38ae0e1db636464c25b10bb9bc3107a25e113c4b6 |
rhoai/odh-ml-pipelines-driver-rhel8@sha256:e877f5b0e9762793f6a3db9b5414bd2b00b0d60a1efc700b63929d9f6dacc7d3 |
rhoai/odh-ml-pipelines-launcher-rhel8@sha256:9306e045b3712d6b02c29b867ff454828bb907018406d0e9f197b3ad5f2d4f3b |
rhoai/odh-ml-pipelines-persistenceagent-rhel8@sha256:807602da33433e97035bd572622ef82cfc6340a0964b1e2691cc85bd4a5927da |
rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8@sha256:03a035917fb752a6764f4b0df6887c2ca82b818a6ef1034db316afe7df85b3bf |
rhoai/odh-ml-pipelines-scheduledworkflow-rhel8@sha256:65679f09adb2c17f31e14f685d18f58b8d66b54aa4f84986432008adc06a28dd |
rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8@sha256:7e12c09fe0a0b4ee3270d6822288433ff4d2441cb2720131282595866cb3fc1c |
rhoai/odh-mlmd-grpc-server-rhel8@sha256:ab9b4172279d2ab00dbaa853a701aa39196efc391547c8d00fb850fb6d518c07 |
rhoai/odh-mm-rest-proxy-rhel8@sha256:84e38a58b55a616414e2ab856b69038203a5b533794d705d2bb4a757c97b8868 |
rhoai/odh-model-controller-rhel8@sha256:f9dd6ba9b74986d0649b5c6cdbc74a25eb0022b26b0e760da6127ebe3e25b0c2 |
rhoai/odh-modelmesh-rhel8@sha256:eb29ca3c4329fbb9289e543c04a76e3e268dfe8e7363dc9ee944cb8797d907ef |
rhoai/odh-modelmesh-runtime-adapter-rhel8@sha256:7a4796265bae25df034ca5a92b134de461a7abc0b49e0cdddb433b8538a7264e |
rhoai/odh-modelmesh-serving-controller-rhel8@sha256:4d02160fde2a67a78280d4106e60ea64977a5ab37a74b13106815e778c67e77a |
rhoai/odh-notebook-controller-rhel8@sha256:6a7e3bb638503f1c0aeedacee4ee9408e3d251dc27135a14693dd547ec0b50d8 |
rhoai/odh-operator-bundle@sha256:e1c19bbcd4c010ef2bd4f760eb24b2c96cdb82b4e025361a433e6a241eb23cf5 |
rhoai/odh-rhel8-operator@sha256:edf957902dca261f33a22e06886151dc5ad09b1f0f7345c644320c0c2ba1b173 |
rhoai/odh-training-operator-rhel8@sha256:832b1d6e93837b11065d3206e155d34acfba2416adef6eec952d8d76998c0d56 |
rhoai/odh-trustyai-service-operator-rhel8@sha256:a44395156ccf4c2b3f75d331be11d45e1d73c8bc63d77b69ff3c1a70d8122a6c |
rhoai/odh-trustyai-service-rhel8@sha256:6dfe112a17e64fbec117d326ccccebf37ab4e12877cd2f9e0307d94bcc9478b1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.