- Issued:
- 2025-04-28
- Updated:
- 2025-04-28
RHBA-2025:3728 - Bug Fix Advisory
Synopsis
OpenShift Compliance Operator 1.7.0
Type/Severity
Bug Fix Advisory
Topic
OpenShift Compliance Operator 1.7.0 is now available for the Red
Hat OpenShift Enterprise 4 catalog, which includes various bug
fixes and enhancements.
Description
The OpenShift Compliance Operator 1.7.0 is now available. See the
documentation for bug fix information:
Solution
Before applying this update, make sure all previously released
errata relevant to your system have been applied. For details on how
to apply this update, refer to:
Affected Products
- Red Hat OpenShift Container Platform 4.8 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.7 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.6 for RHEL 8 x86_64
Fixes
- OCPBUGS-10336 - Need to include in documentation the way to collect a must-gather for compliance.
- OCPBUGS-33194 - Few File structure looks different when enabling these rules in s390x
- OCPBUGS-42350 - The instructions for rule ocp4-etcd-unique-ca doesn?t work for 4.17 and higher ocp releases
- OCPBUGS-43229 - Compliance Operator rules for checking logging breaks with CLO 6.0
- OCPBUGS-43585 - Allow access to clusterlogforwarder in observability API
- OCPBUGS-48090 - Outdated URL to Compliance Operator documentation
- OCPBUGS-51267 - ComplianceScan Controller has reconcile error
- OCPBUGS-52884 - Rule file-integrity-exists fails on ARM64 clusters
- OCPBUGS-52885 - Rule file-integrity-notification-enabled fails on ARM64 clusters
- OCPBUGS-54212 - Rule kubelet-configure-tls-cipher-suites fails with new ciphers from RFC 8446
- OCPBUGS-54403 - The platform scan fails due to ?failed to parse Ignition config?
- OCPBUGS-54605 - Remediation for directory-access-var-log-audit doesn't appear to be working
- OCPBUGS-53041 - Several OCP rules are not multi-platform aware
- CMP-2956 - CIS OpenShift 1.7.0 Benchmark Support
- CMP-2960 - Compliance Operator support on ARM (CIS OCP 1.7.0 and FedRAMP Moderate Revision 4)
- CMP-3114 - Implement support for Compliance Operator on ARM architecture
- CMP-3134 - Update DISA STIG profile
- CMP-3142 - Implement DISA STIG V2R2 for OpenShift and RHCOS
- CMP-3149 - Implement a deprecation mechanism for profiles
- OCPBUGS-55140 - All rhcos profiles return NOT-APPLICABLE for 4.19
- OCPBUGS-55180 - Rule file-groupowner-ovs-conf-db-hugetlbf fails unexpected
- OCPBUGS-55181 - Rules do not contain NERC-CIP profile annotations
CVEs
- CVE-2019-12900
- CVE-2020-11023
- CVE-2021-43618
- CVE-2021-46848
- CVE-2022-1271
- CVE-2022-36227
- CVE-2022-47629
- CVE-2022-48554
- CVE-2022-49043
- CVE-2023-2602
- CVE-2023-2603
- CVE-2023-7104
- CVE-2023-29491
- CVE-2023-37920
- CVE-2024-2236
- CVE-2024-3596
- CVE-2024-5535
- CVE-2024-8176
- CVE-2024-28182
- CVE-2024-28834
- CVE-2024-28835
- CVE-2024-34397
- CVE-2024-55549
- CVE-2024-56171
- CVE-2025-24928
References
(none)
aarch64
compliance/openshift-compliance-content-rhel8@sha256:8081a7dea09d56ae024089ba7a3b49aa2214a67fa1b06ac717db84eb1b1112c7 |
compliance/openshift-compliance-must-gather-rhel8@sha256:0510fa6be1199ad834407d0d30b03c65ddc56303d20ca34326a8942150733467 |
compliance/openshift-compliance-openscap-rhel8@sha256:2667e775d5f3f2b6f8403a51f84a175fc8b126a68eac60e345b6ba1cad2ccaa2 |
compliance/openshift-compliance-rhel8-operator@sha256:88db4899b08f99fa39648cde308d50f6d724925cf7784d0bf5687cd53551d604 |
ppc64le
compliance/openshift-compliance-content-rhel8@sha256:6a8b2d4e9761ffc0f6a9517a1fab52227867e2bc9f482094dfc21129990a57fb |
compliance/openshift-compliance-must-gather-rhel8@sha256:63592a2e6df0276af6691558de456659c98723d0b22cf0a014ec005c099cace4 |
compliance/openshift-compliance-openscap-rhel8@sha256:80b73080cc1c4ee953a2fe29500d1f40190b66a201d9477c6f40c44c284dc87f |
compliance/openshift-compliance-rhel8-operator@sha256:6d87b384ebae5804fb92887e4c24dd7e2778d263a2b8242ba9a9082855d2449c |
s390x
compliance/openshift-compliance-content-rhel8@sha256:f87d3f65a2e937e66c9014dd2c579ab646140fd9c3f1bbcceeb277a4c801d633 |
compliance/openshift-compliance-must-gather-rhel8@sha256:0645ebf1d344bea648da385be0ab99fa4cd55fac9c4e82eed0eb9847b099b249 |
compliance/openshift-compliance-openscap-rhel8@sha256:671788079044123b548c7c65e964a6050fd6f95675d6c2d8029900221f70916c |
compliance/openshift-compliance-rhel8-operator@sha256:40566e6764735557b1e669d74c2bf5906da6c7ddc31a0e53cdad53625f4aed1a |
x86_64
compliance/openshift-compliance-content-rhel8@sha256:1702d40af60e4ae1ecdbf674665df33f50a3fe3fd0025c700c3732eb7592f8b1 |
compliance/openshift-compliance-must-gather-rhel8@sha256:7df6f85420c9bfacb10664cf4df5603e9970f7e8212ffabb43d3b11e2b9985ab |
compliance/openshift-compliance-openscap-rhel8@sha256:fcf012d7e3e9c82070696d444e6da1c5e35ab83685c77038ba903852a248fbba |
compliance/openshift-compliance-operator-bundle@sha256:49353c2eefa3bb062589a3d6d24f81e063e9911ce1920556d5a801d3afa9bf6b |
compliance/openshift-compliance-rhel8-operator@sha256:f3581e3ce64441facf617f5b035ac7533360e1c267cffd1487b78abcbee5ff97 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.