Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:3742 - Security Advisory
Issued:
2023-06-21
Updated:
2023-06-21

RHSA-2023:3742 - Security Advisory

  • Overview
  • Updated Images

Synopsis

Important: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.

Security Fix(es):

  • goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be (CVE-2021-4238)
  • decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)
  • vault: Hashicorp Vault AWS IAM Integration Authentication Bypass (CVE-2020-16250)
  • vault: GCP Auth Method Allows Authentication Bypass (CVE-2020-16251)
  • nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
  • go-yaml: Denial of Service in go-yaml (CVE-2021-4235)
  • vault: incorrect policy enforcement (CVE-2021-43998)
  • nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)
  • nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)
  • nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)
  • golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
  • golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
  • nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
  • jsonwebtoken: Insecure default algorithm in jwt.verify() could lead to signature validation bypass (CVE-2022-23540)
  • jsonwebtoken: Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC (CVE-2022-23541)
  • golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
  • golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
  • golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)
  • consul: Consul Template May Expose Vault Secrets When Processing Invalid Input (CVE-2022-38149)
  • vault: insufficient certificate revocation list checking (CVE-2022-41316)
  • golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
  • golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
  • net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
  • golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
  • golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
  • json5: Prototype Pollution in JSON5 via Parse Method (CVE-2022-46175)
  • vault: Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File (CVE-2023-0620)
  • hashicorp/vault: Vault’s PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata (CVE-2023-0665)
  • Hashicorp/vault: Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation (CVE-2023-24999)
  • hashicorp/vault: Cache-Timing Attacks During Seal and Unseal Operations (CVE-2023-25000)
  • validator: Inefficient Regular Expression Complexity in Validator.js (CVE-2021-3765)
  • nodejs: Prototype pollution via console.table properties (CVE-2022-21824)
  • golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

These updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:

https://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.13/html/4.13_release_notes/index

All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated images that provide numerous bug fixes and enhancements.

Affected Products

  • Red Hat OpenShift Data Foundation 4 for RHEL 9 x86_64
  • Red Hat OpenShift Data Foundation for IBM Power, little endian 4 for RHEL 9 ppc64le
  • Red Hat OpenShift Data Foundation for IBM Z and LinuxONE 4 for RHEL 9 s390x
  • Red Hat OpenShift Data Foundation for RHEL 9 ARM 4 aarch64

Fixes

  • BZ - 1786696 - UI->Dashboards->Overview->Alerts shows MON components are at different versions, though they are NOT
  • BZ - 1855339 - Wrong version of ocs-storagecluster
  • BZ - 1943137 - [Tracker for BZ #1945618] rbd: Storage is not reclaimed after persistentvolumeclaim and job that utilized it are deleted
  • BZ - 1944687 - [RFE] KMS server connection lost alert
  • BZ - 1989088 - [4.8][Multus] UX experience issues and enhancements
  • BZ - 2005040 - Uninstallation of ODF StorageSystem via OCP Console fails, gets stuck in Terminating state
  • BZ - 2005830 - [DR] DRPolicy resource should not be editable after creation
  • BZ - 2007557 - CVE-2021-3807 nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes
  • BZ - 2028193 - CVE-2021-43998 vault: incorrect policy enforcement
  • BZ - 2040839 - CVE-2021-44531 nodejs: Improper handling of URI Subject Alternative Names
  • BZ - 2040846 - CVE-2021-44532 nodejs: Certificate Verification Bypass via String Injection
  • BZ - 2040856 - CVE-2021-44533 nodejs: Incorrect handling of certificate subject and issuer fields
  • BZ - 2040862 - CVE-2022-21824 nodejs: Prototype pollution via console.table properties
  • BZ - 2042914 - [Tracker for BZ #2013109] [UI] Refreshing web console from the pop-up is taking to Install Operator page.
  • BZ - 2052252 - CVE-2021-44531 CVE-2021-44532 CVE-2021-44533 CVE-2022-21824 [CVE] nodejs: various flaws [openshift-data-foundation-4]
  • BZ - 2101497 - ceph_mon_metadata metrics are not collected properly
  • BZ - 2101916 - must-gather is not collecting ceph logs or coredumps
  • BZ - 2102304 - [GSS] Remove the entry of removed node from Storagecluster under Node Topology
  • BZ - 2104148 - route ocs-storagecluster-cephobjectstore misconfigured to use http and https on same http route in haproxy.config
  • BZ - 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
  • BZ - 2113814 - CVE-2022-32189 golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service
  • BZ - 2115020 - [RDR] Sync schedule is not removed from mirrorpeer yaml after DR Policy is deleted
  • BZ - 2115616 - [GSS] failing to change ownership of the NFS based PVC for PostgreSQL pod by using kube_pv_chown utility
  • BZ - 2119551 - CVE-2022-38149 consul: Consul Template May Expose Vault Secrets When Processing Invalid Input
  • BZ - 2120098 - [RDR] Even before an action gets fully completed, PeerReady and Available are reported as True in the DRPC yaml
  • BZ - 2120944 - Large Omap objects found in pool 'ocs-storagecluster-cephfilesystem-metadata'
  • BZ - 2124668 - CVE-2022-32190 golang: net/url: JoinPath does not strip relative path components in all circumstances
  • BZ - 2124669 - CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY
  • BZ - 2126299 - CVE-2021-3765 validator: Inefficient Regular Expression Complexity in Validator.js
  • BZ - 2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers
  • BZ - 2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters
  • BZ - 2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps
  • BZ - 2134609 - CVE-2022-3517 nodejs-minimatch: ReDoS via the braceExpand function
  • BZ - 2135339 - CVE-2022-41316 vault: insufficient certificate revocation list checking
  • BZ - 2139037 - [cee/sd]Unable to access s3 via RGW route ocs-storagecluster-cephobjectstore
  • BZ - 2141095 - [RDR] Storage System page on ACM Hub is visible even when data observability is not enabled
  • BZ - 2142651 - RFE: OSDs need ability to bind to a service IP instead of the pod IP to support RBD mirroring in OCP clusters
  • BZ - 2142894 - Credentials are ignored when creating a Backing/Namespace store after prompted to enter a name for the resource
  • BZ - 2142941 - RGW cloud Transition. HEAD/GET requests to MCG are failing with 403 error
  • BZ - 2143944 - [GSS] unknown parameter name "FORCE_OSD_REMOVAL"
  • BZ - 2144256 - [RDR] [UI] DR Application applied to a single DRPolicy starts showing connected to multiple policies due to console flickering
  • BZ - 2151903 - [MCG] Azure bs/ns creation fails with target bucket does not exists
  • BZ - 2152143 - [Noobaa Clone] Secrets are used in env variables
  • BZ - 2154250 - NooBaa Bucket Quota alerts are not working
  • BZ - 2155507 - RBD reclaimspace job fails when the PVC is not mounted
  • BZ - 2155743 - ODF Dashboard fails to load
  • BZ - 2156067 - [RDR] [UI] When Peer Ready isn't True, UI doesn't reset the error message even when no subscription group is selected
  • BZ - 2156069 - [UI] Instances of OCS can be seen on BlockPool action modals
  • BZ - 2156263 - CVE-2022-46175 json5: Prototype Pollution in JSON5 via Parse Method
  • BZ - 2156519 - 4.13: odf-csi-addons-operator failed with OwnNamespace InstallModeType not supported
  • BZ - 2156727 - CVE-2021-4235 go-yaml: Denial of Service in go-yaml
  • BZ - 2156729 - CVE-2021-4238 goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
  • BZ - 2157876 - [OCP Tracker] [UI] When OCP and ODF are upgraded, refresh web console pop-up doesn't appear after ODF upgrade resulting in dashboard crash
  • BZ - 2158922 - Namespace store fails to get created via the ODF UI
  • BZ - 2159676 - rbd-mirror logs are rotated very frequently, increase the default maxlogsize for rbd-mirror
  • BZ - 2161274 - CVE-2022-41717 golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
  • BZ - 2161879 - logging issue when deleting webhook resources
  • BZ - 2161937 - collect kernel and journal logs from all worker nodes
  • BZ - 2162257 - [RDR][CEPHFS] sync/replication is getting stopped for some pvc
  • BZ - 2164617 - Unable to expand ocs-storagecluster-ceph-rbd PVCs provisioned in Filesystem mode
  • BZ - 2165495 - Placement scheduler is using too much resources
  • BZ - 2165504 - Sizer sharing link is broken
  • BZ - 2165929 - [RFE] ODF bluewash introduction in 4.12.x
  • BZ - 2165938 - ocs-operator CSV is missing disconnected env annotation.
  • BZ - 2165984 - [RDR] Replication stopped for images is represented with incorrect color
  • BZ - 2166222 - CSV is missing disconnected env annotation and relatedImages spec
  • BZ - 2166234 - Application user unable to invoke Failover and Relocate actions
  • BZ - 2166869 - Match the version of consoleplugin to odf operator
  • BZ - 2167299 - [RFE] ODF bluewash introduction in 4.12.x
  • BZ - 2167308 - [mcg-clone] Security and VA issues with ODF operator
  • BZ - 2167337 - CVE-2020-16250 vault: Hashicorp Vault AWS IAM Integration Authentication Bypass
  • BZ - 2167340 - CVE-2020-16251 vault: GCP Auth Method Allows Authentication Bypass
  • BZ - 2167946 - CSV is missing disconnected env annotation and relatedImages spec
  • BZ - 2168113 - [Ceph Tracker BZ #2141110] [cee/sd][Bluestore] Newly deployed bluestore OSD's showing high fragmentation score
  • BZ - 2168635 - fix redirect link to operator details page (OCS dashboard)
  • BZ - 2168840 - [Fusion-aaS][ODF 4.13]Within 'prometheus-ceph-rules' the namespace for 'rook-ceph-mgr' jobs should be configurable.
  • BZ - 2168849 - Must-gather doesn't collect coredump logs crucial for OSD crash events
  • BZ - 2169375 - CVE-2022-23541 jsonwebtoken: Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
  • BZ - 2169378 - CVE-2022-23540 jsonwebtoken: Insecure default algorithm in jwt.verify() could lead to signature validation bypass
  • BZ - 2169779 - [vSphere]: rook-ceph-mon-* pvc are in pending state
  • BZ - 2170644 - CVE-2022-38900 decode-uri-component: improper input validation resulting in DoS
  • BZ - 2170673 - [RDR] Different replication states of PVC images aren't correctly distinguished and representated on UI
  • BZ - 2172089 - [Tracker for Ceph BZ 2174461] rook-ceph-nfs pod is stuck at status 'CreateContainerError' after enabling NFS in ODF 4.13
  • BZ - 2172365 - [csi-addons] odf-csi-addons-operator oomkilled with fresh installation 4.12
  • BZ - 2172521 - No OSD pods are created for 4.13 LSO deployment
  • BZ - 2173161 - ODF-console can not start when you disable IPv6 on Node with kernel parameter.
  • BZ - 2173528 - Creation of OCS operator tag automatically for verified commits
  • BZ - 2173534 - When on StorageSystem details click on History back btn it shows blank body
  • BZ - 2173926 - [RFE] Include changes in MCG for new Ceph RGW transition headers
  • BZ - 2175612 - noobaa-core-0 crashing and storagecluster not getting to ready state during ODF deployment with FIPS enabled in 4.13cluster
  • BZ - 2175685 - RGW OBC creation via the UI is blocked by "Address form errors to proceed" error
  • BZ - 2175714 - UI fix- capitalization
  • BZ - 2175867 - Rook sets cephfs kernel mount options even when mon is using v1 port
  • BZ - 2176080 - odf must-gather should collect output of oc get hpa -n openshift-storage
  • BZ - 2176456 - [RDR] ramen-hub-operator and ramen-dr-cluster-operator is going into CLBO post deployment
  • BZ - 2176739 - [UI] CSI Addons operator icon is broken
  • BZ - 2176776 - Enable save options only when the protected apps has labels for manage DRPolicy
  • BZ - 2176798 - [IBM Z ] Multi Cluster Orchestrator operator is not available in the Operator Hub
  • BZ - 2176809 - [IBM Z ] DR operator is not available in the Operator Hub
  • BZ - 2177134 - Next button if disabled for storage system deployment flow for IBM Ceph Storage security and network step when there is no OCS installed already
  • BZ - 2177221 - Enable DR dashboard only when ACM observability is enabled
  • BZ - 2177325 - Noobaa-db pod is taking longer time to start up in ODF 4.13
  • BZ - 2177695 - DR dashbaord showing incorrect RPO data
  • BZ - 2177844 - CVE-2023-24999 Hashicorp/vault: Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation
  • BZ - 2178033 - node topology warnings tab doesn't show pod warnings
  • BZ - 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
  • BZ - 2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics
  • BZ - 2178588 - No rack names on ODF Topology
  • BZ - 2178619 - odf-operator failing to resolve its sub-dependencies leaving the ocs-consumer/provider addon in a failed and halted state
  • BZ - 2178682 - [GSS] Add the valid AWS GovCloud regions in OCS UI.
  • BZ - 2179133 - [UI] A blank page appears while selecting Storage Pool for creating Encrypted Storage Class
  • BZ - 2179337 - Invalid storage system href link on the ODF multicluster dashboard
  • BZ - 2179403 - (4.13) Mons are failing to start when msgr2 is required with RHCS 6.1
  • BZ - 2179846 - [IBM Z] In RHCS external mode Cephobjectstore creation fails as it reports that the "object store name cannot be longer than 38 characters"
  • BZ - 2179860 - [MCG] Bucket replication with deletion sync isn't complete
  • BZ - 2179976 - [ODF 4.13] Missing the status-reporter binary causing pods "report-status-to-provider" remain in CreateContainerError on ODF to ODF cluster on ROSA
  • BZ - 2179981 - ODF Topology search bar mistakes to find searched node/pod
  • BZ - 2179997 - Topology. Exit full screen does not appear in Full screen mode
  • BZ - 2180211 - StorageCluster stuck in progressing state for Thales KMS deployment
  • BZ - 2180397 - Last sync time is missing on application set's disaster recovery status popover
  • BZ - 2180440 - odf-monitoring-tool. YAML file misjudged as corrupted
  • BZ - 2180921 - Deployment with external cluster in ODF 4.13 with unable to use cephfs as backing store for image_registry
  • BZ - 2181112 - [RDR] [UI] Hide disable DR functionality as it would be un-tested in 4.13
  • BZ - 2181133 - CI: backport E2E job improvements
  • BZ - 2181446 - [KMS][UI] PVC provisioning failed in case of vault kubernetes authentication is configured.
  • BZ - 2181535 - [GSS] Object storage in degraded state
  • BZ - 2181551 - Build: move to 'dependencies' the ones required for running a build
  • BZ - 2181832 - Create OBC via UI, placeholder on StorageClass dropped
  • BZ - 2181949 - [ODF Tracker] [RFE] Catch MDS damage to the dentry's first snapid
  • BZ - 2182041 - OCS-Operator expects NooBaa CRDs to be present on the cluster when installed directly without ODF Operator
  • BZ - 2182296 - [Fusion-aaS][ODF 4.13]must-gather does not collect relevant logs when storage cluster is not in openshift-storage namespace
  • BZ - 2182375 - [MDR] Not able to fence DR clusters
  • BZ - 2182644 - [IBM Z] MDR policy creation fails unless the ocs-operator pod is restarted on the managed clusters
  • BZ - 2182664 - Topology view should hide the sidebar when changing levels
  • BZ - 2182703 - [RDR] After upgrading from 4.12.2 to 4.13.0 version.odf.openshift.io cr is not getting updated with latest ODF version
  • BZ - 2182972 - CVE-2023-25000 hashicorp/vault: Cache-Timing Attacks During Seal and Unseal Operations
  • BZ - 2182981 - CVE-2023-0665 hashicorp/vault: Vault?s PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata
  • BZ - 2183155 - failed to mount the the cephfs subvolume as subvolumegroup name is not sent in the GetStorageConfig RPC call
  • BZ - 2183196 - [Fusion-aaS] Collect Must-gather logs from the managed-fusion agent namesapce
  • BZ - 2183266 - [Fusion aaS Rook ODF 4.13]] Rook-ceph-operator pod should allow OBC CRDs to be optional instead of causing a crash when not present
  • BZ - 2183457 - [RDR] when running any ceph cmd we see error 2023-03-31T08:25:31.844+0000 7f8deaffd640 -1 monclient(hunting): handle_auth_bad_method server allowed_methods [2] but i only support [2,1]
  • BZ - 2183478 - [MDR][UI] Cannot relocate subscription based apps, Appset based apps are possible to relocate
  • BZ - 2183520 - [Fusion-aaS] csi-cephfs-plugin pods are not created after installing ocs-client-operator
  • BZ - 2184068 - [Fusion-aaS] Failed to mount CephFS volumes while creating pods
  • BZ - 2184605 - [ODF 4.13][Fusion-aaS] OpenShift Data Foundation Client operator is listed in OperatorHub and installable from UI
  • BZ - 2184663 - CVE-2023-0620 vault: Vault?s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File
  • BZ - 2184769 - {Fusion-aaS][ODF 4.13]Remove storageclassclaim cr and create new cr storageclass request cr
  • BZ - 2184773 - multicluster-orchestrator should not reset spec.network.multiClusterService.Enabled field added by user
  • BZ - 2184892 - Don't pass encryption options to ceph cluster in odf external mode to provider/consumer cluster
  • BZ - 2184984 - Topology Sidebar alerts panel: alerts accordion does not toggle when clicking on alert severity text
  • BZ - 2185164 - [KMS][VAULT] PVC provisioning is failing when the Vault (HCP) Kubernetes authentication is set.
  • BZ - 2185188 - Fix storagecluster watch request for OCSInitialization
  • BZ - 2185757 - add NFS dashboard
  • BZ - 2185871 - [MDR][ACM-Tracker] Deleting an Appset based application does not delete its placement
  • BZ - 2186171 - [GSS] "disableLoadBalancerService: true" config is reconciled after modifying the number of NooBaa endpoints
  • BZ - 2186225 - [RDR] when running any ceph cmd we see error 2023-03-31T08:25:31.844+0000 7f8deaffd640 -1 monclient(hunting): handle_auth_bad_method server allowed_methods [2] but i only support [2,1]
  • BZ - 2186475 - handle different network connection spec & Pass appropriate options for all the cases of Network Spec
  • BZ - 2186752 - [translations] add translations for 4.13
  • BZ - 2187251 - sync ocs and odf with the latest rook
  • BZ - 2187296 - [MCG] Can't opt out of deletions sync once log-based replication with deletions sync is set
  • BZ - 2187736 - [RDR] Replication history graph is showing incorrect value
  • BZ - 2187952 - When cluster controller is cancelled frequently, multiple simultaneous controllers cause issues since need to wait for shutdown before continuing new controller
  • BZ - 2187969 - [ODFMS-Migration ] [OCS Client Operator] csi-rbdplugin stuck in ImagePullBackOff on consumer clusters after Migration
  • BZ - 2187986 - [MDR] ramen-dr-cluster-operator pod is in CLBO after assigning dr policy to an appset based app
  • BZ - 2188053 - ocs-metrics-exporter cannot list/watch StorageCluster, StorageClass, CephBlockPool and other resources
  • BZ - 2188238 - [RDR] Avoid using the terminologies "SLA" in DR dashbaord
  • BZ - 2188303 - [RDR] Maintenance mode is not enabled after initiating failover action
  • BZ - 2188427 - [External mode upgrade]: Upgrade from 4.12 -> 4.13 external mode is failing because rook-ceph-operator is not reaching clean state
  • BZ - 2188666 - wrong label in new storageclassrequest cr
  • BZ - 2189483 - After upgrade noobaa-db-pg-0 pod using old image in one of container
  • BZ - 2189929 - [RDR/MDR] [UI] Dashboard fon size are very uneven
  • BZ - 2189982 - [RDR] ocs_rbd_client_blocklisted datapoints and the corresponding alert is not getting generated
  • BZ - 2189984 - [KMS][VAULT] Storage cluster remains in 'Progressing' state during deployment with storage class encryption, despite all pods being up and running.
  • BZ - 2190129 - OCS Provider Server logs are incorrect
  • BZ - 2190241 - nfs metric details are unavailable and server health is displaying as "Degraded" under Network file system tab in UI
  • BZ - 2192088 - [IBM P] rbd_default_map_options value not set to ms_mode=secure in in-transit encryption enabled ODF cluster
  • BZ - 2192670 - Details tab for nodes inside Topology throws "Something went wrong" on IBM Power platform
  • BZ - 2192824 - [4.13] Fix Multisite in external cluster
  • BZ - 2192875 - Enable ceph-exporter in rook
  • BZ - 2193114 - MCG replication is failing due to OC binary incompatible on Power platform
  • BZ - 2193220 - [Stretch cluster] CephCluster is updated frequently due to changing ordering of zones
  • BZ - 2196176 - MULTUS UI, There is no option to change the multus configuration after we configure the params
  • BZ - 2196236 - [RDR] With ACM 2.8 User is not able to apply Drpolicy to subscription workload
  • BZ - 2196298 - [RDR] DRPolicy doesn't show connected application when subscription based workloads are deployed via CLI
  • BZ - 2203795 - ODF Monitoring is missing some of the ceph_* metric values
  • BZ - 2208029 - nfs server health is always displaying as "Degraded" under Network file system tab in UI.
  • BZ - 2208079 - rbd mirror daemon is commonly not upgraded
  • BZ - 2208269 - [RHCS Tracker] After add capacity the rebalance does not complete, and we see 2 PGs in active+clean+scrubbing and 1 active+clean+scrubbing+deep
  • BZ - 2208558 - [MDR] ramen-dr-cluster-operator pod crashes during failover
  • BZ - 2208962 - [UI] ODF Topology. Degraded cluster don't show red canvas on cluster level
  • BZ - 2209364 - ODF dashboard crashes when OCP and ODF are upgraded
  • BZ - 2209643 - Multus, Cephobjectstore stuck on Progressing state because " failed to create or retrieve rgw admin ops user"
  • BZ - 2209695 - When collecting Must-gather logs shows /usr/bin/gather_ceph_resources: line 341: jq: command not found
  • BZ - 2210964 - [UI][MDR] After hub recovery in overview tab of data policies Application set apps count is not showing
  • BZ - 2211334 - The replication history graph is very unclear
  • BZ - 2211343 - [MCG-Only]: upgrade failed from 4.12 to 4.13 due to missing CSI_ENABLE_READ_AFFINITY in ConfigMap openshift-storage/ocs-operator-config
  • BZ - 2211704 - Multipart uploads fail to a Azure namespace bucket when user MD is sent as part of the upload

CVEs

  • CVE-2015-20107
  • CVE-2018-25032
  • CVE-2020-10735
  • CVE-2020-16250
  • CVE-2020-16251
  • CVE-2020-17049
  • CVE-2021-3765
  • CVE-2021-3807
  • CVE-2021-4231
  • CVE-2021-4235
  • CVE-2021-4238
  • CVE-2021-28861
  • CVE-2021-43519
  • CVE-2021-43998
  • CVE-2021-44531
  • CVE-2021-44532
  • CVE-2021-44533
  • CVE-2021-44964
  • CVE-2021-46828
  • CVE-2021-46848
  • CVE-2022-0670
  • CVE-2022-1271
  • CVE-2022-1304
  • CVE-2022-1348
  • CVE-2022-1586
  • CVE-2022-1587
  • CVE-2022-2309
  • CVE-2022-2509
  • CVE-2022-2795
  • CVE-2022-2879
  • CVE-2022-2880
  • CVE-2022-3094
  • CVE-2022-3358
  • CVE-2022-3515
  • CVE-2022-3517
  • CVE-2022-3715
  • CVE-2022-3736
  • CVE-2022-3821
  • CVE-2022-3924
  • CVE-2022-4415
  • CVE-2022-21824
  • CVE-2022-23540
  • CVE-2022-23541
  • CVE-2022-24903
  • CVE-2022-26280
  • CVE-2022-27664
  • CVE-2022-28805
  • CVE-2022-29154
  • CVE-2022-30635
  • CVE-2022-31129
  • CVE-2022-32189
  • CVE-2022-32190
  • CVE-2022-33099
  • CVE-2022-34903
  • CVE-2022-35737
  • CVE-2022-36227
  • CVE-2022-37434
  • CVE-2022-38149
  • CVE-2022-38900
  • CVE-2022-40023
  • CVE-2022-40303
  • CVE-2022-40304
  • CVE-2022-40897
  • CVE-2022-41316
  • CVE-2022-41715
  • CVE-2022-41717
  • CVE-2022-41723
  • CVE-2022-41724
  • CVE-2022-41725
  • CVE-2022-42010
  • CVE-2022-42011
  • CVE-2022-42012
  • CVE-2022-42898
  • CVE-2022-42919
  • CVE-2022-43680
  • CVE-2022-45061
  • CVE-2022-45873
  • CVE-2022-46175
  • CVE-2022-47024
  • CVE-2022-47629
  • CVE-2022-48303
  • CVE-2022-48337
  • CVE-2022-48338
  • CVE-2022-48339
  • CVE-2023-0361
  • CVE-2023-0620
  • CVE-2023-0665
  • CVE-2023-2491
  • CVE-2023-22809
  • CVE-2023-24329
  • CVE-2023-24999
  • CVE-2023-25000
  • CVE-2023-25136

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.13/html/4.13_release_notes/index

aarch64

odf4/mcg-cli-rhel9@sha256:05955b12d9597865f21a2fce097eecaf16218d1b2a3147fbdd0fe0199f792549
odf4/mcg-core-rhel9@sha256:f37b4f0598d46dd8ca2183ea52d52e96163f71666617a98c671100a705be2cb0
odf4/mcg-rhel9-operator@sha256:e05c0308d1008f447f87bdea4b23ef56e98d27cd6845c261f5d31cb9cdbb46ac
odf4/ocs-client-rhel9-operator@sha256:e692d480075469adeb6fbec1d08121fadaedcde7950e5a2dfdfb6024e38d8990
odf4/ocs-rhel9-operator@sha256:64aa10ced42edb3481d94d62261f56fa991220e9eeec7b142fda6b95a5c2d69d
odf4/odf-csi-addons-rhel9-operator@sha256:fb35cb085e41eabcc8d8a8cb5b9981968361642f1d15a011d537f7422a2c832b
odf4/odf-csi-addons-sidecar-rhel9@sha256:16af2c689218d80e450101428796ecbbef331bfbb9153eb328670477284a2684
odf4/odf-multicluster-rhel9-operator@sha256:1635e20f43a11759364b2ab5a52c5cee9cd2bc141888b6857f3e3703b90e8eee
odf4/odf-must-gather-rhel9@sha256:a42dd93af9e17fe4af792ccc4c92487f33bf38e1642e21f8e86e23fa86e78a68
odf4/odf-rhel9-operator@sha256:98ded63b6b4180c52715a6d580afb9b212c4643d53ccc9e00993e2d1bcd41396
odf4/odr-rhel9-operator@sha256:cc99437c3b06b4bf307f36ebf533bdbd3721c43035044a972d69258b9414555d

ppc64le

odf4/cephcsi-rhel9@sha256:e1af0b5bc33688e5ca9c209658dd44285f4d1707e0c165a7c6a7f4934006f5f9
odf4/mcg-cli-rhel9@sha256:945ca7475dff23abc318af69b9513b9412f3b8b3498fbeb8c59c114c5fdeea2c
odf4/mcg-core-rhel9@sha256:1f4994c5fa092afb665c3b63a8691ba5b15702f83fbd1e4ac70eb1803f6f68f2
odf4/mcg-operator-bundle@sha256:1e1adf4e3f3766f183daf98ff88de7dbb76cd000a81ac2e698ca74e9e0f2c0e6
odf4/mcg-rhel9-operator@sha256:e7e47e90eba427843513e2bc868d4ae3f0816db9847ddec4f96a6f41cd0769ab
odf4/ocs-client-operator-bundle@sha256:fdeab34e65c61763315f4a3ce0d8a092c825589f58ea4d9e320a2376955023bf
odf4/ocs-client-rhel9-operator@sha256:d89f084da3f8d145b1e5e9e4d0dc63994c06422b6df92c9efac0e162fd8610b2
odf4/ocs-metrics-exporter-rhel9@sha256:7d1c503d9f48a8efec3f06aa3deb28144a888c88f1bb3beeeb2465ae58b5e394
odf4/ocs-operator-bundle@sha256:24bc40a30a9c0731ac718374fdae5b7e1c45f103495294245d704ca0f69f35df
odf4/ocs-rhel9-operator@sha256:ec86e82a9fc412e174561fe9f808b05cee716c7e6498498c3b3d32e48d6f19ed
odf4/odf-console-rhel9@sha256:b0981a245672d2f918cad4d5e4a43f1fdd403d446e3f890de18b0dc71141dc1c
odf4/odf-csi-addons-operator-bundle@sha256:23c631bed1bca5a339c63032bf4b02edb27f0f0d15a81de66208dd7328a22f6b
odf4/odf-csi-addons-rhel9-operator@sha256:328ebea8a0577b3b3f5df2ddfda109134350f700ccde362834ca4aa88614cde8
odf4/odf-csi-addons-sidecar-rhel9@sha256:3785b04c0d5464eb4514bd3b98e59b2b39815a58e0afc2730104e4e69613ad87
odf4/odf-multicluster-console-rhel9@sha256:4043076d1e3cdb560ef5ad4b4f06a911590105e655c34d083751be9b1f070423
odf4/odf-multicluster-operator-bundle@sha256:33c136b3d0e5ed8d4fb781566c2bac3cdc01c30e0351035bf962f35203af87a2
odf4/odf-multicluster-rhel9-operator@sha256:f67f2ba7c47e14c493d22a500423c92b0cc01f8d9570aa3f51a0cb1957f836af
odf4/odf-must-gather-rhel9@sha256:e657739355245310c8182c682bc003ce0d3d6abac6115c34a9ca7ffaf8983ade
odf4/odf-operator-bundle@sha256:11849f9242099ab4a4b16c6160f23a8a460d41146e2a3e850e7299ab3fd13f04
odf4/odf-rhel9-operator@sha256:d223f6995bdea0799c8201b658aa81c36ae00188be030012b89d8cda643f4ed8
odf4/odr-cluster-operator-bundle@sha256:fe5ccee2ea5902cef3f8c9a94fb9be9516013cc7376e088710fef4a85310db9f
odf4/odr-hub-operator-bundle@sha256:51d49bd086645a17b80c40e800d88b0a818de8f5ddc1814f6dc23102da920eb2
odf4/odr-rhel9-operator@sha256:3d26a840d8a42838bb8bc3ba51cac65f3a502450644e30e9331ea08d805c1ec1
odf4/rook-ceph-rhel9-operator@sha256:c9054d4393cfe4a11e81c5e73f2349c12f315caaabd05a060de0a39effb43bd0

s390x

odf4/cephcsi-rhel9@sha256:3cc3dfbc6d6227a4085ffc5bef9dab0702e7d2096ad782b6b0c9c002f1e60749
odf4/mcg-cli-rhel9@sha256:861762b4a8aa19ed2ece5d1b48a2aea137dbba2b03af40570bdb60ceda426dde
odf4/mcg-core-rhel9@sha256:5d0ab671d71e1d6307836a05e0a9f14bb260277f646dc63252291b12921473c2
odf4/mcg-operator-bundle@sha256:d5bea64dc86eee978b678c6d47d855568b97a18c9c5c3e5998f0ca36f945a296
odf4/mcg-rhel9-operator@sha256:a2e6602ddc468c91df80eeb06e0dff4dc1fa509b4b68de43be466b9bd1a90316
odf4/ocs-client-operator-bundle@sha256:150eea388a6ede971105b485c52ed4cbd4d3f0c8dffa32bf09d08b542e109362
odf4/ocs-client-rhel9-operator@sha256:3258ec9716f45b3428352cc3510d6d8b3ca41ed75fd1a81cd61275249d3fef90
odf4/ocs-metrics-exporter-rhel9@sha256:c5a5c9515f2b2564ecd718886f2e27ec54402d29ea4bf6e1ad33f63eb0bd9d57
odf4/ocs-operator-bundle@sha256:9ae5f567047c26d7ebb36c53c304f402b03c276923621e3dd51d35d1b4b0e0d0
odf4/ocs-rhel9-operator@sha256:d67c7a2032a92737c0f9ab9ff2f181b3e15d53203bd4cbb6eef9b3d9655631e4
odf4/odf-console-rhel9@sha256:d13cad8671f69122e33afde5e53b0a9e0728fbfac2df3e981b14bc57b990f210
odf4/odf-csi-addons-operator-bundle@sha256:e3265779c83c26832c898c9f64ec1287a8e63a32433a8303b8e3952e008a3ae9
odf4/odf-csi-addons-rhel9-operator@sha256:841ce1cde9d230458bd071fa943ebfc3dda29fc0e63ebabd2dad8bdd055acfa0
odf4/odf-csi-addons-sidecar-rhel9@sha256:10884ba2e3e9b44fa49347567caa01966578ac3ca45d50a37e0650a98aa095e6
odf4/odf-multicluster-console-rhel9@sha256:889eb0d94a9a573e42d04e4edbd97a389d74157c94bee674df17b2184de1fcde
odf4/odf-multicluster-operator-bundle@sha256:593cf98fc32b66381bd7e324c89b0a21b7ffec63541bb403b900121d712237f9
odf4/odf-multicluster-rhel9-operator@sha256:a6dbf5d5d116661fd99348452bbb89458a7cf9326ff64aea285dcb4b0a9893cf
odf4/odf-must-gather-rhel9@sha256:dd3eddf1183c67b1011f35f15b85fd5998edb1812852a3b51f1c2971d5155870
odf4/odf-operator-bundle@sha256:31c6af39b67cb39bfe954cee68825094198d12c7f14542ca284ed609c40b32e8
odf4/odf-rhel9-operator@sha256:0564c1165a893f0eea270f636cef8fb9c75704b73bd8ae291a5438122be64484
odf4/odr-cluster-operator-bundle@sha256:b284b72288e596677427b6ac51fb142fe6b84f5c3b6f43d395bc403643c443cf
odf4/odr-hub-operator-bundle@sha256:3d438d91ac261b77075da23d9d08dd603fdbc99aa2c1d4c50681feea5dcfbbc1
odf4/odr-rhel9-operator@sha256:dff514a42676f68e0faef651dd14ca91fd8a21f4911c7525fbfa965b748d6317
odf4/rook-ceph-rhel9-operator@sha256:61ec798f3d2bab62b4e56ecba236359e2edd3dd1a7095b839a36530a9b90c98f

x86_64

odf4/cephcsi-rhel9@sha256:069d8bdcaa6ddc628f115d6ec3f3e851e06d4274594d9cd3cd567e574ba1baed
odf4/mcg-cli-rhel9@sha256:357598ae9ea1314a29e9321aff303c36002b499e6474e14ae58ed63290a76f55
odf4/mcg-core-rhel9@sha256:862a2ab41511a86c7e7ee1f0538736b78e49035f3e8fb6d8e801608b913c2826
odf4/mcg-operator-bundle@sha256:ebfd21cd14efd7c95d53c8f3b939e4e8167ae9aed8ad12ce1985a3d09e2a51be
odf4/mcg-rhel9-operator@sha256:5143db374ccea9fe2a7ca95b1bc655c403509faff7e42b8c672767bc2863418e
odf4/ocs-client-operator-bundle@sha256:4c595ee2b908460180617dba1057fab5e48d8ddd07d434948ebbd9232bec80de
odf4/ocs-client-rhel9-operator@sha256:9e67b060718c891f53d000f0899006f226d703de63b6feede42ea45df9686b64
odf4/ocs-metrics-exporter-rhel9@sha256:2d6cdbf994a9bd03e80b8fba39d6d4b033622615c543ff0300ee960508ae07aa
odf4/ocs-operator-bundle@sha256:b44f5fbf874ea565d566c7a149e0be4333d07d1c896dba9aa0a308a35e990e41
odf4/ocs-rhel9-operator@sha256:4610b8989b6fae91da065da2a50f661dd044ea22452372c4321f74a935c6de7c
odf4/odf-console-rhel9@sha256:97d94bc216b9265135493a262ffcd39a7c5f9f67cdcac39c0a7c4378ded420b9
odf4/odf-csi-addons-operator-bundle@sha256:531016e1b8d56e49130ef8a9610223142c0410b41c7e099d5fa08289afa99306
odf4/odf-csi-addons-rhel9-operator@sha256:a8f28a0c576d5eabfa1b11cb3ca94cfaca7d295a3f419f3557a0d9cbb6f91135
odf4/odf-csi-addons-sidecar-rhel9@sha256:eada63799fc6cb128d2a05a2324700500e1ea2f0dc573899832782ef568ce2a9
odf4/odf-multicluster-console-rhel9@sha256:1225db4ef5dd45e5886949babd7db2b5679be927e3a5324d1d0737ba7be96aa3
odf4/odf-multicluster-operator-bundle@sha256:caa3e66684c046b1a4ce3fdc1d617b65fcc78a330268069a9cc02e071501c482
odf4/odf-multicluster-rhel9-operator@sha256:811dfbb10cd4012b8765d751d52c44b40469bf4758cd284b8edf6093cb7123a2
odf4/odf-must-gather-rhel9@sha256:b64b3f6b1e423e2fcc5c9af6434c8bf0c03498070379b948d82eced1d3b94cbf
odf4/odf-operator-bundle@sha256:64c9d563c9c5e193325f923844b676faa3bbe5c0657b7dee743e03b29c018cef
odf4/odf-rhel9-operator@sha256:26663e4d48a70edb4fd100fd86819398ef84da4f9e9da077a4e36deb5c002d9b
odf4/odr-cluster-operator-bundle@sha256:0b5657e09bc199379108afec4b858f1dc2289e705e2e14d383fc3ddaa307c6bf
odf4/odr-hub-operator-bundle@sha256:0699f1e80453ed3a9bff43c3e431ddd786dafd2f166b62b94f18dc77f4467b25
odf4/odr-rhel9-operator@sha256:4c5294036e2e5e0afc6a177d5172e85bcb347b0f4a71ce48847834e677047615
odf4/rook-ceph-rhel9-operator@sha256:9d9289a4b9d4342db67022b0da93249b38f98a499fb6442912528611fde35266

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility