Skip to content

Commit f7f2d18

Browse files
committed
File Integrity Operator 1.3.3 release note
1 parent 950defd commit f7f2d18

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed

security/file_integrity_operator/file-integrity-operator-release-notes.adoc

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,32 @@ For an overview of the File Integrity Operator, see xref:../../security/file_int
1515

1616
To access the latest release, see xref:../../security/file_integrity_operator/file-integrity-operator-updating.adoc#olm-preparing-upgrade_file-integrity-operator-updating[Updating the File Integrity Operator].
1717

18+
[id="file-integrity-operator-release-notes-1-3-3"]
19+
== OpenShift File Integrity Operator 1.3.3
20+
21+
The following advisory is available for the OpenShift File Integrity Operator 1.3.3:
22+
23+
* link:https://access.redhat.com/errata/RHBA-2023:5652[RHBA-2023:5652 OpenShift File Integrity Operator Bug Fix and Enhancement Update]
24+
25+
This update addresses a CVE in an underlying dependency.
26+
27+
[id="file-integrity-operator-1-3-3-new-features-and-enhancements"]
28+
=== New features and enhancements
29+
30+
* You can install and use the File Integrity Operator in an {product-title} cluster running in FIPS mode.
31+
32+
[IMPORTANT]
33+
====
34+
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see (link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode])
35+
====
36+
37+
[id="file-integrity-operator-1-3-3-bug-fixes"]
38+
=== Bug fixes
39+
40+
* Previously, some FIO pods with private default mount propagation in combination with `hostPath: path: /` volume mounts would break the CSI driver relying on multipath. This problem has been fixed and the CSI driver works correctly. (link:https://access.redhat.com/solutions/7017081[Some OpenShift Operator pods blocking unmounting of CSI volumes when multipath is in use])
41+
42+
* This update resolves CVE-2023-39325. (link:https://access.redhat.com/security/cve/CVE-2023-39325[*CVE-2023-39325*])
43+
1844
[id="file-integrity-operator-release-notes-1-3-2"]
1945
== OpenShift File Integrity Operator 1.3.2
2046

0 commit comments

Comments
 (0)