- Issued:
- 2023-06-06
- Updated:
- 2023-06-06
RHEA-2023:3477 - Product Enhancement Advisory
Synopsis
OpenShift Container Platform 4.12.20 CNF vRAN extras update
Type/Severity
Product Enhancement Advisory
Topic
An update for ztp-site-generate-container, topology-aware-lifecycle-manager and bare-metal-event-relay is now available for Red Hat OpenShift Container Platform 4.12.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the extra low-latency container images for Red Hat OpenShift Container Platform 4.12. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2023:3410
All OpenShift Container Platform users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
For details about how to apply this update, see:
Affected Products
- Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for ARM 64 4.10 aarch64
Fixes
- OCPBUGS-11931 - hub side lookup function on managed cluster itself for policy templating should be allowed
- OCPBUGS-11927 - TALM keeps spinning with the hub template error when unsupported hub template function is being used in the second policy
- OCPBUGS-13707 - Misleading backup conditions in CGU when all clusters are already compliant
- OCPBUGS-4664 - dataset_comparison should be G.8275.x in ptpconfig source crs
- OCPBUGS-6990 - TALM does not enforce subscriptions when catalogsource is updated and both policies are in the same CGU
- OCPBUGS-11849 - TALM precaching pulls more content than needed
- OCPBUGS-10052 - Missing events in consumer after restarting hw-event-proxy with HTTP transport
CVEs
- CVE-2021-26341
- CVE-2021-33655
- CVE-2021-33656
- CVE-2022-1462
- CVE-2022-1679
- CVE-2022-1789
- CVE-2022-2196
- CVE-2022-2663
- CVE-2022-3028
- CVE-2022-3239
- CVE-2022-3522
- CVE-2022-3524
- CVE-2022-3564
- CVE-2022-3566
- CVE-2022-3567
- CVE-2022-3619
- CVE-2022-3623
- CVE-2022-3625
- CVE-2022-3628
- CVE-2022-3707
- CVE-2022-4129
- CVE-2022-20141
- CVE-2022-25265
- CVE-2022-30594
- CVE-2022-36227
- CVE-2022-39188
- CVE-2022-39189
- CVE-2022-41218
- CVE-2022-41674
- CVE-2022-42703
- CVE-2022-42720
- CVE-2022-42721
- CVE-2022-42722
- CVE-2022-43750
- CVE-2022-47929
- CVE-2023-0394
- CVE-2023-0461
- CVE-2023-1195
- CVE-2023-1582
- CVE-2023-23454
- CVE-2023-27535
References
(none)
x86_64
openshift4/bare-metal-event-relay-operator-bundle@sha256:8e9ea75815be944f12a80f583e8bd62e435373e78157d6b9028396f77c9445ca |
openshift4/bare-metal-event-relay-rhel8-operator@sha256:4b0925f6e5a19bd4275b38f89fa1ecc8a4a082b7d8d2acabd09450b16cf94a95 |
openshift4/baremetal-hardware-event-proxy-rhel8@sha256:d79f85de943cd3590ebc5284e72dc4b06470dd5a12fb5dde7bef80f830abe783 |
openshift4/topology-aware-lifecycle-manager-operator-bundle@sha256:982a6402896a9b718b5233be0c19de7f2034580da3791c80348595a66736a3de |
openshift4/topology-aware-lifecycle-manager-precache-rhel8@sha256:a8e696e81b856e6b1e6b067c75d471792b061e8c938b76f07a2fea8f40d0190d |
openshift4/topology-aware-lifecycle-manager-recovery-rhel8@sha256:6912f0e188541e4dca2b26b0775a310ec9cee06c24cea931ccb0e8207679587d |
openshift4/topology-aware-lifecycle-manager-rhel8-operator@sha256:b0d649d66274ecaa8c263ecb37a2d4e0d43409b0d7f9dd44ba517c502cb21148 |
openshift4/ztp-site-generate-rhel8@sha256:18935df6d28abf63945cd3679daa372c1badbeb30c4338a5f507aed31b629f1e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.