- Issued:
- 2024-11-21
- Updated:
- 2024-11-21
RHEA-2024:9971 - Product Enhancement Advisory
Synopsis
RHEA: sandboxed-containers bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Topic
OpenShift sandboxed containers 1.8.0 release images, which fix bugs
and update container images, is available.
Description
OpenShift sandboxed containers 1.8.0
OpenShift sandboxed containers, based on the Kata Containers
open source project, provides an Open Container Initiative
(OCI)-compliant container runtime using lightweight virtual
machines running your workloads in their own isolated
kernel—therefore contributing an additional layer of
isolation back to OpenShift’s defense-in-depth strategy.
This advisory contains the container images for OSE-OSC that
include bug fixes and container upgrades.
Solution
Before applying this update, make sure all previously
released errata relevant to your system have been applied.
Refer to https://docs.redhat.com/en/documentation/openshift_sandboxed_containers for additional information.
Affected Products
- Red Hat OpenShift Container Platform 4.14 for RHEL 9 x86_64
Fixes
CVEs
- CVE-2019-12900
- CVE-2021-3903
- CVE-2023-37920
- CVE-2024-2236
- CVE-2024-2398
- CVE-2024-2511
- CVE-2024-3596
- CVE-2024-3727
- CVE-2024-4032
- CVE-2024-4603
- CVE-2024-4741
- CVE-2024-5535
- CVE-2024-6104
- CVE-2024-6232
- CVE-2024-6345
- CVE-2024-6923
- CVE-2024-8235
- CVE-2024-24788
- CVE-2024-24791
- CVE-2024-30203
- CVE-2024-30204
- CVE-2024-30205
- CVE-2024-34397
- CVE-2024-50602
References
(none)
s390x
openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:9d1ce9c5c0be11dfdb9183b393b6951f8502b493c34d1313fa07833143c28ede |
openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:a06dd6ae5b103aefe1f3dc34fa904fe103bb0cdbee3d92fbe00a9b8f327a3028 |
openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0d45e65070f9a9cccd1504fc75aab7c42764d604d293d09121b4bd6e3ec00a51 |
openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:a1c1b97c089378e79bd43c2c642a086539f7738f4aea642718bb04ee665d5df2 |
openshift-sandboxed-containers/osc-operator-bundle@sha256:6346fd13984d04477bf624aa454263940bd818cef655f771b076ba4d78f99abf |
openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:cbb2b6bb80e33a633cd46aab581b0c24af6cfce29d76e03ce779d01bc15b20f0 |
openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:cbbbff6995eef423b485f72b606bdb5a4c128b0e30cb22c1b84bdfc8ff7a67bc |
openshift-sandboxed-containers/osc-rhel9-operator@sha256:dca49b82ef9118dcf5b848f122a85f50544b143b5ce0658befdea7507c655476 |
x86_64
openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:91f99e7cef07497510ce7a407631add477aef8f45b81f3efe94d008055aade39 |
openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:e3cb91cb2d5580f4d0ca32496255273cdc7fd77e701455e1e281d62dbf31ce11 |
openshift-sandboxed-containers/osc-monitor-rhel9@sha256:c21ab3001bacdf8cc94b3f07fc6c6fb43233c7982ae1390ae53813804ae9eb33 |
openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:f2789d8fc6297a43cf7415433af52d77a6bde4e03c9ff3004037c1e9edb5e797 |
openshift-sandboxed-containers/osc-operator-bundle@sha256:7465f4e228cfc44a3389f042f7d7b68d75cbb03f2adca1134a7ec417bbd89663 |
openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:53b21a9afed622c03f002ad22dd1b2b7c727cbd6480720989bf95187a7180e90 |
openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:a2dfc02e811fa69af1f2e4c0c5338aa90d975e9921caa1de86eb1c3315a9296d |
openshift-sandboxed-containers/osc-rhel9-operator@sha256:57b2e08ca3b33c754ba6f35f72e6dc0fced9c31c82e102c26118789a933c073d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.