Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:4591 - Security Advisory
Issued:
2024-07-17
Updated:
2024-07-17

RHSA-2024:4591 - Security Advisory

  • Overview
  • Updated Images

Synopsis

Important: Red Hat OpenShift Data Foundation 4.16.0 security, enhancement & bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.16.0 on Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.

Security Fix(es):

  • get-func-name: ReDoS in chai module (CVE-2023-43646)
  • opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics (CVE-2023-47108)
  • golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
  • golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
  • golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
  • golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
  • jose: resource exhaustion (CVE-2024-28176)
  • jose-go: improper handling of highly compressed data (CVE-2024-28180)
  • submariner-operator: RBAC permissions can allow for the spread of node compromises (CVE-2024-5042)
  • nodejs-ws: denial of service when handling a request with many HTTP headers (CVE-2024-37890)
  • node-tar: denial of service while parsing a tar file due to lack of folders depth validation (CVE-2024-28863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):
These updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:

https://docs.redhat.com/en/documentation/red_hat_openshift_data_foundation/4.16/html/4.16_release_notes/index

All Red Hat OpenShift Data Foundation users are advised to upgrade to these packages that provide these bug fixes and enhancements.

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenShift Data Foundation 4 for RHEL 9 x86_64
  • Red Hat OpenShift Data Foundation for IBM Power, little endian 4 for RHEL 9 ppc64le
  • Red Hat OpenShift Data Foundation for IBM Z and LinuxONE 4 for RHEL 9 s390x
  • Red Hat OpenShift Data Foundation for RHEL 9 ARM 4 aarch64

Fixes

  • BZ - 2069759 - Ramen needs to improve reporting of status when s3 gateway is down
  • BZ - 2078270 - In OSD cluster, storage cluster node selector allowing scheduling storage api pods on infra node
  • BZ - 2128142 - [MDR]VRG does not report DataReady if there are no PVCs protected in a MetroDR
  • BZ - 2132724 - [RFE] [RDR] mirror peer is taking a lot of time to come in ExchangedSecret
  • BZ - 2136413 - [RDR] [UI] When DRPC is deleted from the local-cluster via UI, it doesn't provide deletion status/progress
  • BZ - 2139835 - ramen-dr-cluster ManifestWork does not reconcile properly
  • BZ - 2210040 - [UI] ODF Topology details of Deployment does not have header
  • BZ - 2214499 - [Tracker for https://bugzilla.redhat.com/show_bug.cgi?id=2266035] ceph-client.admin crashed in ceph-exporter thread with "throw_invalid_argument(char const*, boost::source_location const&)+0x37) [0x557c40cab267]"
  • BZ - 2214948 - [Tracker][RDR] Appset based workload remain stuck upon deletion via ACM UI though necessary tolerations are added
  • BZ - 2215910 - [UI] Error message improvements. Block pool Edit label checks failed.
  • BZ - 2216213 - [RDR] No error message shown while editing few immutable fields in DRPolicy
  • BZ - 2216803 - Rook ceph exporter pod remains stuck in terminating state when node is offline
  • BZ - 2222146 - ODF Nooba creates route which OpenShift compliance operator marks as non-compliant
  • BZ - 2231360 - OSD addition always stucks when Ceph reports HEALTH_ERR due to full OSDs
  • BZ - 2238308 - Should not allow to create a 2nd dr Policy on an existing cluster set with an existing dr policy
  • BZ - 2239587 - [RDR][CEPHFS][Tracker] sync for some pvc hangs
  • BZ - 2240951 - ODF should allow to manage pod tolerance from a single place
  • BZ - 2241149 - CVE-2023-43646 get-func-name: ReDoS in chai module
  • BZ - 2242832 - [RDR] Percentage of a few rbd image states needs adjustments on UI
  • BZ - 2243244 - [RDR] UI shows misleading VolumeSynchronizationDelay critical alert until lastGroupSyncTime is available in DRPC
  • BZ - 2244353 - [OCP Tracker] [RDR][CEPHFS] volsync-rsync-src pod's are stuck in ContainerCreating with msg for volume is not a mountpoint
  • BZ - 2246186 - [RDR] [Hub recovery] After hub recovery, MCO didn't recreate the VolumeReplicationClass
  • BZ - 2246364 - [RFE] Tooltip for External object provider used capacity card
  • BZ - 2246834 - [RDR] [Node failure] [CephFS] Relocate remains stuck forever with MountVolume.SetUp failed error when one of the three worker nodes was rebooted during the relocation
  • BZ - 2251022 - [RDR] [Hub recovery] Failover of rbd workloads didn't proceed after drpc reporting WaitForStorageMaintenanceActivation
  • BZ - 2251198 - CVE-2023-47108 opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
  • BZ - 2251308 - Unable to uninstall ocs-client-operator
  • BZ - 2252318 - Mirroring Peer is not removed in Ceph when mirroring is disabled in StorageCluster
  • BZ - 2253043 - [Tracker ACM-9159] [RDR] [Hub recovery] [CephFS] Data sync stopped for multiple workloads after one of the managed clusters which went down was restored
  • BZ - 2253076 - [RFE][RDR][MDR] Need OCP alert when S3 bucket request to upload or retrieve metadata fails
  • BZ - 2255998 - [RDR] [Hub recovery] Failover for most cephfs and a few rbd workloads remain stuck at WaitingForResourceRestore
  • BZ - 2256563 - status card doesn't reflect the status for Standalone ODF/Noobaa deployment
  • BZ - 2256899 - Duplicate metrics in ocs-metrics-exporter
  • BZ - 2257259 - csi-addons-controller-manager pod is reset after running the must-gather command
  • BZ - 2257949 - [ODF Hackathon]: Quota Alerts overlapping (quotaobjects and quotaobjectsexhausted) and flapping (RGW)
  • BZ - 2258801 - [Provider-Client] Noobaa backingstore is created on a PV pool instead of RGW
  • BZ - 2258861 - [RDR] [Hub recovery] Both graphs are empty for one of the managed clusters due to missing metrics
  • BZ - 2258950 - [Tracker Ceph BZ #2259180] [CEE/SD][cephfs] mds crash: void MDLog::trim(int): assert(segments.size() >= pre_segments_size)
  • BZ - 2259195 - Storage - Data Foundation : I18n misses
  • BZ - 2259209 - [GSS] Rook-Ceph orperator deployment check/fail if 2 StorageClassDeviceSets are deployed but name: is not unique
  • BZ - 2259616 - UI option while changing resource profile the node memory details are updated with new additions
  • BZ - 2259847 - RBD Mirror daemon count is not validated in StorageCluster
  • BZ - 2260325 - [Non Contanerized NSFS] Creating an account using the node CLI with the --from_file option requires setting the creation_date property
  • BZ - 2260550 - Standalone Noobaa cannot change tolerations on Noobaa pods
  • BZ - 2260757 - Tracker for OCP bug OCPBUGS-27853
  • BZ - 2261938 - UI: unselected option should remain same after navigating back
  • BZ - 2262134 - rook-ceph-mon pods listen to both 3300 and 6789 port
  • BZ - 2262455 - [MDR] VirtualMachine PV claimRef definition does not include "kind: PersistentVolumeClaim"
  • BZ - 2262461 - [IBM Support] noobaa-db-pg-0 stuck in CLBO state
  • BZ - 2262921 - CVE-2024-1394 golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
  • BZ - 2262943 - PrometheusRule evaluation failing for pool-quota.rules
  • BZ - 2262992 - [Non Contanerized NSFS] The allow_bucket_creation property is ignored when creating an account
  • BZ - 2262997 - [Non Contanerized NSFS] Account credentials standards are not checked when using the --from_file option
  • BZ - 2263148 - ODF installation fails if "Performance Mode" is picked up during install ( "Performance Mode" requests on CPU exceed available cpu on OCP node )
  • BZ - 2263468 - Manual Deletion of storageconsumer deletes the storageclassrequests but not the underlying pool and subvolumegroup(due to volumes present under them)
  • BZ - 2263488 - [RDR] [Hub recovery] [Co-situated] Cleanup remains stuck after failover when older primary cluster is recovered
  • BZ - 2263818 - Some texts are not clearly visible in StorageSystem details page when using Dark Mode
  • BZ - 2264435 - [RDR] [UI] Spurious VolumeSynchronizationDelay alert persists in UI after application deletion
  • BZ - 2264480 - db-noobaa-db-pg-0 PVC continues to grow extensively, activitylogs already truncated need to either fix or workaround
  • BZ - 2264767 - [4.15][RDR][Hub Recovery] Failover remains stuck with WaitForReadiness
  • BZ - 2264900 - PVC cloning is failing with error "RBD image not found"
  • BZ - 2265340 - [must-gather] No need to call pre-install script for help flag
  • BZ - 2265492 - Add Runbooks for ODF alerts - some text correction is required in Runbooks for few alerts
  • BZ - 2265562 - [MCG] S3 GetObject with an invalid VersionId argument on an AWS or IBMCOS Namespacestore MCG bucket fails and leaves the Namespacestore Rejected
  • BZ - 2266316 - PrometheusRuleFailures alert after installation or upgrade
  • BZ - 2266562 - [Non Contanerized NSFS] CreateMultipartUpload operation is failing with "Access Denied" error
  • BZ - 2266621 - mon pod scaledown is skipped if the mons are portable
  • BZ - 2266629 - Noobaa operator code is missing one AWS region
  • BZ - 2266845 - Token usage explanation in the UI is not as per design doc
  • BZ - 2266930 - No error message displayed when ux pod is down and we try to generate onboarding token
  • BZ - 2267067 - rbd metrics are not available on Provider-Client cluster
  • BZ - 2267610 - Openshift console UI shows "techPreview" label for multus for ODF create storage system method
  • BZ - 2267907 - [RDR] CephFS subvolume left behind in managed cluster after deleting the application
  • BZ - 2267965 - [4.16][RDR][Hub Recovery] Failover remains stuck with WaitForReadiness
  • BZ - 2268019 - CVE-2024-24783 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
  • BZ - 2268022 - CVE-2024-24785 golang: html/template: errors returned from MarshalJSON methods may break template escaping
  • BZ - 2268046 - CVE-2024-24786 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
  • BZ - 2268820 - CVE-2024-28176 jose: resource exhaustion
  • BZ - 2268854 - CVE-2024-28180 jose-go: improper handling of highly compressed data
  • BZ - 2268939 - [GSS] Standalone MCG stuck in Rejected Phase after fresh deployment
  • BZ - 2269319 - Missing runbook_url on OSDCPUHigh alert
  • BZ - 2269354 - [RFE] Change the default interval duration for two ServiceMonitors, 'rook-ceph-exporter' and 'rook-ceph-mgr'
  • BZ - 2270064 - [Tracker ACM-10508][RDR] [Node failure] [CephFS] Src PVC did not clean up post relocate operation hindering data sync
  • BZ - 2270446 - management-console unresponsive when copied name with trailing space into resource name input
  • BZ - 2271593 - Create storage-system wizard overlaps Project dropdown
  • BZ - 2271804 - [Non Contanerized NSFS] list_multipart_uploads is not listing incomplete multipart uploads
  • BZ - 2271921 - Noobaa is not deployed successfully over Azure cluster Error: <nil>, Params: map[is_master:true]}
  • BZ - 2272386 - [Non Contanerized NSFS] put-bucket-policy of some invalid policies result in InternalError instead of MalformedPolicy
  • BZ - 2272469 - ocs-operator.v4.16.0-61 failed to install due to ocs-operator in CLBO
  • BZ - 2272528 - [RDR] [UI] [Hub recovery] [Co-situated] Subscription based apps go missing on passive hub from application dropdown of Data policies page after site-failure
  • BZ - 2272644 - [UI] BlockPool option is missing under Storage? Data Foundation ---> Storage systems tab
  • BZ - 2272664 - Default resource allocation for ODF Noobaa BackingStore is too low when used as storage for Internal Registry
  • BZ - 2272666 - [MCG 4.16] MCG bucket logging always writes to the root level of the logs bucket and not to the defined prefix
  • BZ - 2272928 - Consumption trend displays only current date in the graph. Not showing previous days.
  • BZ - 2272932 - [MCG 4.16] MCG bucket logging fails to deliver logs withiin 24h
  • BZ - 2272938 - [RDR] tokenexchange addons are not getting deployed on ManagedClusters
  • BZ - 2273305 - Both Storageclassclaim and Storageclaim are listed under Provided API for the ocs-storage-client Installed operator page
  • BZ - 2273336 - ocs-metrics-exporter pod doesnot contain 'node.ocs.openshift.io/storage' toleration
  • BZ - 2273386 - change odf CSV pods to read only root file system
  • BZ - 2273387 - change ocs CSV pods to read only root file system
  • BZ - 2273398 - [GSS][ODF 4.16 backport] Legacy LVM-based OSDs are in crashloop state
  • BZ - 2273533 - [RDR] Unexpected webhook MCO error when creating additional DRPolicy from the ACM console
  • BZ - 2273553 - ocs-operator is going into "CrashLoopBackOff" state after adding virtualHostnames in storagecluster yaml
  • BZ - 2273560 - "virtual host style" support for RGW is not working
  • BZ - 2273605 - [MDR][RDR] Drpolicy is in Not validated state with error msg spec: Invalid value: "object": replicationClassSelector is immutable, spec: Invalid value: "object": volumeSnapshotClassSelector is immutable
  • BZ - 2273702 - [RDR] [Discovered Apps] kubeObjectProtection.disabled should be set as false by default
  • BZ - 2273705 - [RDR] [Discovered Apps] ramenOpsNamespace should be set by default and required namespace should be created by ramen or mco operator
  • BZ - 2274107 - Failure in Cluster-Wide Encryption Key Rotation for NooBaa Secret 'noobaa-root-master-key-volume'.
  • BZ - 2274175 - With Replica-1 enabled, replicated pool is spreading PGs across all OSDs
  • BZ - 2274193 - cleartext postgres password in noobaa-db-pg init container logs
  • BZ - 2274324 - [RDR][MDR] [Discovered Apps] VeleroNamespaceSecretKeyRef and CACertificates fields in the ramen hub configmap should not be removed by mco operator
  • BZ - 2274373 - Collect rbd image details from rados namespaces within a cephblockpool in must-gather command
  • BZ - 2274381 - ceph commands are not collected with --odf ; -c or -o -pc options with 4.16 must-gather
  • BZ - 2274392 - PV encryption with AZURE KMS failed with certificate error.
  • BZ - 2274476 - ODF4.16 console, On the "Installed Operator" web page the Rook-Ceph operator should be hidden
  • BZ - 2274548 - CSI_DISABLE_HOLDER_PODS config value misspelled
  • BZ - 2274728 - [RDR][MDR] Kubernetes objects Sync status is not getting updated in Protected Application page
  • BZ - 2274734 - [RDR][MDR] The data services page has vanished after a while.
  • BZ - 2274750 - [RDR] [Tracker ACM-10967] Pods in NS openshift-operators on hub with ACM observability enabled starts crashing after a few days
  • BZ - 2274757 - [rook][GSS][ODF 4.14.6] Notify/alert end user if legacy OSDs are LVM backed
  • BZ - 2274765 - [RDR] [Discovered Apps] Ceph fs imperative workloads are not getting DR protected
  • BZ - 2275049 - Nooba service stuck in 'NoobaaInitializing' state due to missing Azure credentials during ODF deployment with cluster-wide encryption using Azure KMS
  • BZ - 2275181 - Enable kube object protection for openshift-dr starting from 4.16
  • BZ - 2275222 - In Replica-1 data always goes to one particular osd and never goes to the additional osds present for a failure domain
  • BZ - 2275254 - [DR] Count namespace protected DRPC as one application
  • BZ - 2275413 - remove extra hop in deleting public secret while rotating keys
  • BZ - 2275456 - After upgrade, old csv ocs-operator.v4.15.2-rhodf is in failed state due to conflicting CRD owner in namespace
  • BZ - 2275484 - Rook operator is hardcoded to use redhat catalog, even when installing ODF from a custom catalog
  • BZ - 2275886 - rook-ceph-operator after upgrade to ODF 4.16 is in CrashLoopBackOff
  • BZ - 2275935 - Disk replacement procedure failed with cli tool
  • BZ - 2276028 - ODF client operator has nondescript information on the operator hub
  • BZ - 2276055 - Sync provider mode specific changes from main to 4.16
  • BZ - 2276056 - Sync ocs-client-operator main to 4.16 branch
  • BZ - 2276135 - ocs-operator should not be annotating all openshift-* namespaces
  • BZ - 2276222 - [RDR] [Hub recovery] [Co-situated] Primary workloads become secondary, UI also shows incorrect information
  • BZ - 2276344 - [RDR][MDR] [Discovered Apps] ramen-dr-cluster-operator pod in CrashLoopBackOff state
  • BZ - 2276353 - [RDR] [Discovered Apps] recipe-controller-manager pod in CrashLoopBackOff state
  • BZ - 2276366 - [UI] Provider mode. 'Prepare the cluster for RDR'. Remove not supported UI elements
  • BZ - 2276413 - Remove extra tiles of arbiter and make storageclient clusterscoped - Creation of Storageclient from UI is blocked
  • BZ - 2276438 - [UI] All modes. Update msg "This view is only supported for Internal mode cluster" on Topology
  • BZ - 2276591 - Rook is not creating "rook-ceph-csi-config" configmap when CSI is deployed by ocs-client-op
  • BZ - 2276593 - StorageClaim controller fails to query the type of claim from CR and logs empty value
  • BZ - 2276694 - Expose the upgrade setting for a longer timeout waiting for healthy OSDs before continuing
  • BZ - 2276913 - custom tolerations are not replicated to rook-ceph-operator-stable-4.16-redhat-operators-openshift-marketplace subscription
  • BZ - 2276941 - [RDR][MDR][Discovered Apps] Kube objects protected resourceConditions is not getting updated after every kubeobject sync
  • BZ - 2277184 - [UI][MDR][RDR] Delete button is not in disabled state when trying to delete DRpolicy attached to workloads
  • BZ - 2277186 - [GSS] noobaa-operator logs expose aws secret
  • BZ - 2277711 - Add Tech Preview flag to Azure Key Vault UI support
  • BZ - 2277766 - [RDR][MDR] [Discovered Apps] ODF operator should install Recipe operator on managed clusters
  • BZ - 2277770 - [RDR][MDR][Discovered Apps] Recipe operator does not have logo/image and it's missing description
  • BZ - 2277773 - [RDR][MDR] [Discovered Apps] ODF-DR operator should create openshift-dr-ops namespace on managedclusters and hub cluster
  • BZ - 2277785 - [RDR][MDR] [Discovered Apps] Protection of Discovered Apps fails with msg namespaces "ramen-ops" not found
  • BZ - 2278120 - [MCG 4.16] PVPool Backingstore pod enters CLBO due to missing agent_conf.json file
  • BZ - 2278389 - [IBM Support] After upgrade to OCP/ODF 4.14 Stand alone MCG backing store getting rejected/not ready with ENOSUPT
  • BZ - 2278593 - Heartbeat job running in hcp based cluster is not sending the cluster name
  • BZ - 2278603 - [RDR][Discovered Apps] UI is not checking for targetcluster status at the time of failover and relocate
  • BZ - 2278606 - After Upgrade ODF4.15-ODF4.16 with multus [dropping holder design], pod FailedMount to pvc [ceph-fs and ceph-rbd]
  • BZ - 2278676 - Provider mode. Create StorageClient form. IP is not allowed without https prefix
  • BZ - 2278681 - Must-gather needs changes in the API names for the deprecated Storageclassclaim, Storageclassrequest etc
  • BZ - 2278684 - 4.16 must-gather missing all relevant logs and details from openshift-storage namespace
  • BZ - 2278799 - Revert ODF capacity trend, UI should not display the related graph and values in 4.16.0.
  • BZ - 2278815 - [VolumeGroupSnapshot] csi-cephfsplugin-provisioner and csi-rbdplugin-provisioner pods stuck in CrashLoopBackOff state after enabling featuregate in OCP
  • BZ - 2279742 - [GSS] NooBaa DB PVC consumption rising continuously
  • BZ - 2279860 - Clicking the Storage status card results in "Minified React error #31"
  • BZ - 2279928 - [rook][GSS][ODF 4.14.6] Notify/alert end user if legacy OSDs are LVM backed
  • BZ - 2280342 - ServiceMonitor ramen-hub-operator-metrics-monitor selector too open
  • BZ - 2280378 - Must-gather -pc option to collect client side logs needs changes as storageclient is now cluster-scoped
  • BZ - 2280657 - [MDR][RDR][Discovered Apps]: On fresh installation Ramen pod crashes on managed cluster as OADP Operator is not installed
  • BZ - 2280813 - Cephblockpoolradosnamespace, cephfilesystemsubvolumegroup and storagerequest are not deleted with storageconsumer deletion
  • BZ - 2280818 - [odf-operator] csi-addons upgrade should be handled by ocs-client-op
  • BZ - 2280820 - csi-addons upgrade should be handled by ocs-client-op
  • BZ - 2280834 - noobaa-db-pg-0 in CLBO post ODF upgrade from 4.14 to 4.15, while OCP is 4.14
  • BZ - 2280921 - CVE-2024-5042 submariner-operator: RBAC permissions can allow for the spread of node compromises
  • BZ - 2280946 - Cephblockpoolradosnamespace and subvolumegroups not deleted with storageconsumer deletion
  • BZ - 2280953 - Add translations for ODF 4.16 release
  • BZ - 2281580 - CephSubVolumeGroup cleanup job fails due to missing subvolumegroup name env
  • BZ - 2281722 - [UI][Provider mode] StorageCluster fields missed when created from UI. cephFilesystems. disableSnapshotClass and disableStorageClass
  • BZ - 2281729 - [MCG] The prefix filter is ignored in log-based replication policies
  • BZ - 2282243 - [RDR] DR monitoring dashboard crashes after enabling ACM observability
  • BZ - 2282254 - Mon stay in CrashLoopBackOff when deploying ODF single stack ipv6
  • BZ - 2282284 - [RDR][Discovered Apps] ramen proceeds to recover kubeObjects from a capture even if the capture is invalid
  • BZ - 2282314 - [UI][Provider mode] No utilization data on ODF Client dashboard
  • BZ - 2282543 - Noobaa-DB Failed mount on cluster with multus
  • BZ - 2282834 - [MDR][Discovered Apps] Application volumes (PVCs) Sync status is not getting updated in Protected Application page and always status as critical
  • BZ - 2283024 - Hide the recipe Operator from Installed Operators page
  • BZ - 2283489 - Too many ocs-metrics-exporter secrets created
  • BZ - 2283621 - [UI][Provider mode] Remove Client related resources available for Clients with stable heartbeat
  • BZ - 2283629 - Must Gather collects redundant data in collection in odf mode
  • BZ - 2283651 - [MDR]: All the deployed application has protected status set to false
  • BZ - 2283797 - ODF Nooba creates route which OpenShift compliance operator marks as non-compliant
  • BZ - 2283820 - [MDR][RDR] Discovered application pre-reqs require automated velero secret creation
  • BZ - 2283965 - Resource label selector as a default option for discovered applications
  • BZ - 2283981 - Must-gather: Error in the oc describe command of csidriver, collection of describe output fails
  • BZ - 2284090 - Capacity & Utilization cards do not incorporate custom StorageClasses (Block & file dashboard)
  • BZ - 2284430 - Console, every few seconds the "create local volume set" page switches to "Discovering disks on all hosts"
  • BZ - 2284652 - [GSS] NooBaa Backingstore In Phase: "Connecting" with "Invalid URL" Blocking Upgrade from ODF v4.13 to ODF v4.14
  • BZ - 2290677 - [MDR]: Post relocation new PVC created on primary cluster
  • BZ - 2290847 - [MCG] Expired object deletion fails with lifecycle errors
  • BZ - 2291132 - [UI] Home => Overview page crashes when ceph osd crosses the near full ratio limits
  • BZ - 2291182 - [UI][Provider mode] Remove StorageClaim form from management-console
  • BZ - 2291255 - [Discovered Apps] Disable volsync with cephfs on regionaldr setups for 4.16
  • BZ - 2291301 - [UI] Hide recipe selection from the enroll discovered application wizard
  • BZ - 2291305 - [Tracker] [RDR][Discovered Apps] drpc status is stuck in WaitForReadiness after performing failover operation
  • BZ - 2291336 - [RDR] [MDR] : Missing Icon, description, and pod for Openshift DR Cluster Operator
  • BZ - 2292114 - [Provider mode] Upgrade to 4.16 failed when storageconsumer is present
  • BZ - 2292241 - [QA Only] Qualify RHCS-6.1z6 with ODF-4.16.0 in the external mode
  • BZ - 2292777 - CVE-2024-37890 nodejs-ws: denial of service when handling a request with many HTTP headers
  • BZ - 2293200 - CVE-2024-28863 node-tar: denial of service while parsing a tar file due to lack of folders depth validation
  • BZ - 2293621 - bug in encryption key rotation steps while removing key slot
  • BZ - 2293634 - [MDR][RDR] Discovered apps are not getting FailedOver with OADP 1.4
  • BZ - 2293881 - Revert changes done to limit StorageClassDevicesetName in bug 2269099 for 4.16
  • BZ - 2294383 - [UI] Provider Mode is shown in StorageSystem creation wizard.
  • BZ - 2296991 - PG state is not active+clean in arbiter deployment

CVEs

  • CVE-2023-3128
  • CVE-2023-4822
  • CVE-2023-6597
  • CVE-2023-43646
  • CVE-2023-47108
  • CVE-2023-49568
  • CVE-2023-49569
  • CVE-2024-0450
  • CVE-2024-1394
  • CVE-2024-5042
  • CVE-2024-24783
  • CVE-2024-24785
  • CVE-2024-24786
  • CVE-2024-28176
  • CVE-2024-28180
  • CVE-2024-28863
  • CVE-2024-37890

References

  • https://access.redhat.com/security/updates/classification/#important

aarch64

odf4/mcg-core-rhel9@sha256:5c2628c9c3de8ff9eaf6c727eaa2b4382741f21afeb4154329714b404fb4e1df
odf4/mcg-rhel9-operator@sha256:968deb95e9fde6ba12565e3ef601bfc60551ac6ac7c122b2bdacea09b6574266
odf4/ocs-client-rhel9-operator@sha256:95a047d3be90468e15a9f246f8e0fbfd159f18f7a9841d07c75e6c3f30c7c80a
odf4/ocs-rhel9-operator@sha256:ab289e798f909cf238f410984b7388db2f0a20794a3d55a06031fd9771efeaf7
odf4/odf-cli-rhel9@sha256:f518a439b56354f01a647d3c0550c909b42a879607982ce50bbbc0b6403a58f9
odf4/odf-csi-addons-rhel9-operator@sha256:8a090360648affdb24c12d7c2efaffc07bc21deb8b29f4ad3c12cf0a5ee6e19b
odf4/odf-csi-addons-sidecar-rhel9@sha256:41064d2db3c4c1e651f2df89d6cd4a19027c6930edc6ab66b5535a2cd7f39f49
odf4/odf-multicluster-rhel9-operator@sha256:36a0a82ab0c1e9d67d31aa8afe81bc1485541e3aefa221dbbc2a6822edfe8515
odf4/odf-must-gather-rhel9@sha256:3dc59c38e0cde2c9974d3fa5a7ce1c9f98589a5aeb486fdc8a8e7717656522fe
odf4/odf-rhel9-operator@sha256:dd9ca8286f54ba8e4151414afc65cbc4d619430676ab2735afc2a1e086b17921
odf4/odr-rhel9-operator@sha256:61fb5b6ebf9ee44b9271eb3526cb3175c9a135f86223e165c05b73a390f617ea

ppc64le

odf4/cephcsi-rhel9@sha256:5fbef84c4a88ad4ea88a1b2232cc0d6630fa47c8e3ae874a485c971c6d5951b9
odf4/mcg-core-rhel9@sha256:088b9e19fc16a4fbb655b81ab1fbe78aa82ebce2ad5ad0df67fc8b361b4fe170
odf4/mcg-operator-bundle@sha256:7c00300daa75158d7a406317be71f2a8932a613b769144ae92a5ae225f4feb1e
odf4/mcg-rhel9-operator@sha256:193a773d4f1ed8ec6097579507dddd3863301ec546e325e38b5290235f06c802
odf4/ocs-client-console-rhel9@sha256:a20b4235cee3193794be549c645164c2811a044498a777591437ff440264a7da
odf4/ocs-client-operator-bundle@sha256:9c3b15da5ddf22af93ae1617329ef41fddb4e6c00bbf9ea12567c4fc2c14cfdf
odf4/ocs-client-rhel9-operator@sha256:d383069c5e89e051a15e95e61e9bd5197edf4f91fde60df8b8ed7d4e8269452e
odf4/ocs-metrics-exporter-rhel9@sha256:38d7fe0b8fa164df79d08fe2d20af60d7530e2691e7d4f183d71f138a00a128e
odf4/ocs-operator-bundle@sha256:e1abb6a3be342350f7b3f641f9e036e2bd998e5fd6bd215730f3d39526e1d16f
odf4/ocs-rhel9-operator@sha256:a9cdb157400f7826b8c5075591d26dd9e25628e94189de3b90c8e9389e3181ed
odf4/odf-cli-rhel9@sha256:4b79f14a1d5130673921c4d711c0b919377307dd6d76d14386f9f83a5e1b4ecd
odf4/odf-console-rhel9@sha256:5700bc3e6aadfa1890bb81bcc70f0ef026b5bd0d38f1e4bd35d04d5ceee7808d
odf4/odf-cosi-sidecar-rhel9@sha256:43334d92af32e97a11691d0fa7069746d59d6f73a0a2c0b97bbbfdc7937f117a
odf4/odf-csi-addons-operator-bundle@sha256:c4b5c7247825d7265f83ae5fb5e8a0f62fbb69cdbaf535d0d83320b817d7ef48
odf4/odf-csi-addons-rhel9-operator@sha256:aff1de5e9ad24bbfacda0bf34bb6b28d27c3f9ce646ed53e93b4c87eb0bda93c
odf4/odf-csi-addons-sidecar-rhel9@sha256:272f038ebe7fd778c6c24dcc27524f3aa807465576177681b8b80a6adb32be99
odf4/odf-multicluster-console-rhel9@sha256:d77cb43b5019248b790134edc980d7fb260c4dcb884f8e54d27c33b876a5f897
odf4/odf-multicluster-operator-bundle@sha256:e87b8be96be2c5042af949785dd0c543e28d9432914a9543b08fd38d4a1e11ff
odf4/odf-multicluster-rhel9-operator@sha256:ef3d403c990fa7f2af167a123af043970cadc00b78b454b93dd9a4bca2699d2b
odf4/odf-must-gather-rhel9@sha256:0ee210a535f1f11de40e1a0ee55a10855ce13c09dab9791ee4d35c59949ca934
odf4/odf-operator-bundle@sha256:21c8ba4e41692cc24ce0127b4198413183451eff19a461941e9efb6bd140bfb4
odf4/odf-prometheus-operator-bundle@sha256:0b08f6aba84c9f64b3253f5f23efaa0bba47be37f2582378509849b73db165e4
odf4/odf-rhel9-operator@sha256:cf81ea45b333424981129e464f1374739a4f309efdcb26b9f7df2df4d346c1a9
odf4/odr-cluster-operator-bundle@sha256:1d89cd1a73d1bbd66988ce2224de39b799ecfa1cfe96d0ec2619ccc059c11d20
odf4/odr-hub-operator-bundle@sha256:cd38debd1e2088a81a31ac95eda219ad9d58d255ac0ed157a804837b00a87ac0
odf4/odr-recipe-operator-bundle@sha256:096d6e38c34c0c89e2b2e49d6c8b61acf9f88033d3b2814eefa62abee30d4993
odf4/odr-rhel9-operator@sha256:3452dc4a07cb296d2102f3fbc34865496dcd418f602dc117cb327893f6464e71
odf4/rook-ceph-operator-bundle@sha256:911c38bf283079dd024087bda48a37ddf0ec981da4589596565706e5dfcd6dad
odf4/rook-ceph-rhel9-operator@sha256:e1a7fd2bf349908c710237a1f832a4e161e049d09691d36c453bc8ddb0e0eebe

s390x

odf4/cephcsi-rhel9@sha256:c94f20ad65f5411c7cabafd574e52f2fcb52d2f917003ae71adc736028f962bf
odf4/mcg-core-rhel9@sha256:f4a85d993ae326570a5e4dd8bdf9e5cec586c2f8b55a962940457f39787d6af8
odf4/mcg-operator-bundle@sha256:3cc0e4ec3f46d066bfc5546a2efdab3a44aa38f2d6dc961509bee8f7f9cb5ddb
odf4/mcg-rhel9-operator@sha256:f717a955a7ca2c3b1eac84e4b192ab38dcf1e98f6baea0ef592071c60f389bd1
odf4/ocs-client-console-rhel9@sha256:a552dbccf217e8deaec318bcaf9b40877d3be1e88d091ae1684959f48367e0f2
odf4/ocs-client-operator-bundle@sha256:978017d3524aded83f4c63710e0b10dc2a453a22b5bc9ef801c7e70ac13aee40
odf4/ocs-client-rhel9-operator@sha256:f2ab9f9eb9e502f0d78b32159dfc5aeae77ec9698ed3a2aeecd184407388f1e3
odf4/ocs-metrics-exporter-rhel9@sha256:a8f0e209e62e02a20648f982360e5b5ec7e62c294b4f7eb7df53ccd0bb750008
odf4/ocs-operator-bundle@sha256:92c7cf4ce69644ffa955c78b1e18aab5f9c3a843f889703a326ea9e6697455af
odf4/ocs-rhel9-operator@sha256:f5e5b787848d5838aaaeb58e3b8836ff67b4fcf9a2d3c9d19f27e06818fdf295
odf4/odf-cli-rhel9@sha256:60ca8f2d341b1f1a09710a37c40f4c803c6b1b2d09fc1a7f53f9a979ad6643d6
odf4/odf-console-rhel9@sha256:5972ba4c75e54f1670ec5ffb0a5a749a6992967ea0dd6e5d442019fa64dc1515
odf4/odf-cosi-sidecar-rhel9@sha256:8512465ad8828593d0f4b6d4208a6c60a0f297f70ef26a0c4c874f6ddf4798d2
odf4/odf-csi-addons-operator-bundle@sha256:ab568f027f842174927e1ccc7ca00448068e9241f40f53034d9ba74aaf062aa1
odf4/odf-csi-addons-rhel9-operator@sha256:3a4ec2b8d194134fc4a3cb9077306ba71eaef4e4544177f590c73ae7e40d490b
odf4/odf-csi-addons-sidecar-rhel9@sha256:859301df4f104e3d36efc2446929c86805e586c3c5ac07548d0277442d5df6ca
odf4/odf-multicluster-console-rhel9@sha256:2ca34569661d388d50cc0e9f5949ea7a404ceb266981855b3251c329dab88e11
odf4/odf-multicluster-operator-bundle@sha256:9a42214d500a600785bb9a7bdd5b9580a5f8cfbf16980eb48bde3ae4ce855f3c
odf4/odf-multicluster-rhel9-operator@sha256:8a8f7e1126adc73d210cdf8454c64356e2229e3aefc5bb4ba5a8bc7755a5d469
odf4/odf-must-gather-rhel9@sha256:631643362d4345fdefb3fb34416ca09626b634c92fde970e1494a95fe5bdfc87
odf4/odf-operator-bundle@sha256:24d9bcb0da6e061f9de31768e94b660f955323e130f7eb0fc9e8746c1709d3f8
odf4/odf-prometheus-operator-bundle@sha256:64ca1e84e10bbc7522da216e4965658e06c540fce8c18f2976dab5c3236ea256
odf4/odf-rhel9-operator@sha256:0976ab8ba60319bf9ef20503de0fa249055e18a82ab36113affe7ad177b3f187
odf4/odr-cluster-operator-bundle@sha256:efdcf383abcb962ea0fdb92a9fa31f60a150a2c48174303881b550e5d9dec6f7
odf4/odr-hub-operator-bundle@sha256:491a5b629d9777815ee6d28356cf82a7fd7939f2a39e65ae833440af1831b1db
odf4/odr-recipe-operator-bundle@sha256:4d03e157d3ed69eef8a8ee8a6c8f9e0746c16baa6ccff7c5c8a7457e9a8b9a56
odf4/odr-rhel9-operator@sha256:c6b46eca6dfec3a8fb48b61393707e11e8cc573aad7eb6ff95c4661092e913f0
odf4/rook-ceph-operator-bundle@sha256:79ad5ac0ee525277a8a1bd550428a5e0a04da73aa1d9df23d085ec888d12d45b
odf4/rook-ceph-rhel9-operator@sha256:5c3c4bbf1bf820995a13588d02a8cf692e1343da25def005dab981078b14d970

x86_64

odf4/cephcsi-rhel9@sha256:ac0c3a8d86539bc4668e1a6de82e1f8439a1fbbb17a3b4102cabf078f021b41f
odf4/mcg-core-rhel9@sha256:2c29d14c5d64f810cc68fdb894700819f5122a354d5cbb473cf73f517f5315e9
odf4/mcg-operator-bundle@sha256:061fc659ec847d38201a7b049b813df1fddac1e97d2caddaaac3d91d5e05fd46
odf4/mcg-rhel9-operator@sha256:d608a1d128733b31b552d8410c1d95cb740646cea32b79ee401d2de178e08ca9
odf4/ocs-client-console-rhel9@sha256:46486b7e3b087bfec9c7b0dd4547af1190cee2be55dee7400ec90e6dc4b434f4
odf4/ocs-client-operator-bundle@sha256:8f650cf5915d5b7a15931e4a11d7c6be43d16068132f4cb4ef3e0c3e3cfbc17c
odf4/ocs-client-rhel9-operator@sha256:41c7883aafc2938852f5920ac2a178e1b0f39e0acdb817678696adec90fa2686
odf4/ocs-metrics-exporter-rhel9@sha256:cd6bbc33a59480c1c504a88f86ca4bb51de037db3c993581d18ee7e887c96dcc
odf4/ocs-operator-bundle@sha256:2bd43ed14d916a13f2d631f8dc350313c47619033134463399d76e77688f4c2e
odf4/ocs-rhel9-operator@sha256:a714121fa385acb6fe75bb74f402be8cf6da85372fd4a34abfbb9b546782e9c0
odf4/odf-cli-rhel9@sha256:92bd51fa0a6ee62be70dda32f5d922e70f4aea630b70bc7b5b74d0bf3c1d3a66
odf4/odf-console-rhel9@sha256:67108dd96a553925f2759cc5359447315aff09e7628a8228e71b04a8dee25f63
odf4/odf-cosi-sidecar-rhel9@sha256:8b0583cf72b39299e6769f9c9fdc4321b7e384405aec8d1519d4ea5ac060fd05
odf4/odf-csi-addons-operator-bundle@sha256:cf07146641dab9fe090c2b44d8f533375a5d04b8fcdedb42f75f10916b5b6ba6
odf4/odf-csi-addons-rhel9-operator@sha256:87e2d4e45b3d308e6937791d906c277df67c45321c7b760cca528f36e68d263d
odf4/odf-csi-addons-sidecar-rhel9@sha256:162f35a85baabd9055c53717463c908247769a9bf617a4b457adf398d2e972be
odf4/odf-multicluster-console-rhel9@sha256:f9f73b9781288b1a52b06edb752efc9475a315e1dd9a445e28cc47d571762cfc
odf4/odf-multicluster-operator-bundle@sha256:1ab09e10bfe23ed2e08513d887bd36c4bed003d6bcb7f1885364ef5a606ec010
odf4/odf-multicluster-rhel9-operator@sha256:2eb40b0c565a4d150229ab504adfb2e0a2b4a5b25ff8ccb690e6d2dcae3bf424
odf4/odf-must-gather-rhel9@sha256:44c6bb264bbbd0ad67978dd2b4e01c530e653baf14b15f8a1eddff675fa760bd
odf4/odf-operator-bundle@sha256:8ef36128140b9a90403fb672178d07be7fd16ddf9809ec628a693e0e2dd6d4a9
odf4/odf-prometheus-operator-bundle@sha256:078bd92b92c28c3899986f4c6755950f3de044ca6b7214353cc0e84d2a67d570
odf4/odf-rhel9-operator@sha256:1d7f610fea74bb30b0276aa40556d9c03762c10f3bb71618afb5e6f5af718688
odf4/odr-cluster-operator-bundle@sha256:f500d5f16ea39d262ad4c52a9be03953e6e7ffa0f4349860976c41a70d8bb0e5
odf4/odr-hub-operator-bundle@sha256:80f47a30616834100466219c9e4d8c67fcef9554b2075c2bf81905c86b03d46b
odf4/odr-recipe-operator-bundle@sha256:d556581772224fe60606ece392a210f1a3b3de01a26959197c594634694d6ebb
odf4/odr-rhel9-operator@sha256:0ef121586e961be58480d76ba988719daaa82e606a8cc3649a0d01ef75227bc0
odf4/rook-ceph-operator-bundle@sha256:c1f4872828308bf7f0477697fb74a0ab7c3f595e2c33e29ee873232efca1960d
odf4/rook-ceph-rhel9-operator@sha256:0df69e6e3d2add83c5a74faff76837a49333184b1d170acee968d4c064933bcf

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility