- Issued:
- 2019-06-06
- Updated:
- 2019-06-06
RHBA-2019:0794 - OpenShift Container Platform 3.11 bug fix update
Synopsis
OpenShift Container Platform 3.11 bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 3.11.104 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.11.104. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2019:0795
This update fixes the following bugs:
-
Director-deployed pods would stop in the
CrashLoopBackOffstate after a rolling reboot of a node. This was because theREADYsequence would display a node before it had started. Now, theREADYindicator allows components to come online before displaying as a ready state. (BZ#1654044) -
Ansible playbook
health.ymlassumedcuratorwas adeploymentconfiginstead of acronjob. Now, thehealth.ymlplaybook checks forcuratoras acronjob. This change properly evaluates thecuratorstatus. (BZ#1676720) -
The
NetworkPolicyplugin did not clean up rules from deleted namespaces. Now, allOpenVSwitchflows associated with a namespace are deleted properly when a namespace is deleted. (BZ#1686025) -
During
Satelliteregistry-based installations of OpenShift Container Platform 3.11, the example template URLs were installed at the wrong file path. This would cause example resources to be configured incorrectly. Now, a condition has been added to replace the image URL with theSatellitelocation. As a result, the example resources are configured with valid image URLs. (BZ#1689848) -
Previously, cluster logging did not store secret names in service accounts. When secrets were required to be whitelisted, the logging service accounts were unable to access their required secrets. Now, secret names are added appropriately to their service accounts. (BZ#1690605)
-
oc cpcommands were not checking links from tar files used to copy files between pods and user's workstations. Theoc cpcommand could cause a directory traversal and replace or delete files on a user's workstation. Now, escaping links are not permitted. As a result, theoc cpcommand verifies files copied between pods and workstations without allowing escape from directories. (BZ#1693315) -
During previous upgrades, the
tunedpackage and profiles could have been removed. Thetunedrole was not being applied during an upgrade, but only during a fresh install. Now, thetunedrole is applied during upgrades to ensuretunedprofiles are applied appropriately. (BZ#1694131) -
NetworkPolicyrules were not updated reliably after service restarts. A bug in the re-initialization process of the plugin state after a restart of the SDN service would ignore changes in a namespace. Now, updates toNetworkPoliciesare now correctly tracked at all times. (BZ#1694704) -
Monitoring certificates were not updated after certificate redeployment. As a result,
prometheus,grafana, andalertmanageruser interfaces were inoperable. Now the TLS secrets and pods are removed during certificate redeployment and the user interfaces work correctly after certificate redeployment. (BZ#1696198)
All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system are applied.
See the following documentation, which will be updated shortly for release 3.11.104, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/articles/11258.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 3.11 | x86_64 |
| Red Hat OpenShift Container Platform for Power | 3.11 | ppc64le |
Updated Packages
- atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.x86_64.rpm
- cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm
- golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.src.rpm
- openshift-ansible-docs-3.11.104-1.git.0.379a011.el7.noarch.rpm
- cri-o-debuginfo-1.11.13-1.rhaos3.11.gitfb88a9c.el7.x86_64.rpm
- atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.src.rpm
- atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm
- golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.ppc64le.rpm
- atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.x86_64.rpm
- openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.ppc64le.rpm
- openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.x86_64.rpm
- atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.src.rpm
- atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.src.rpm
- openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.x86_64.rpm
- atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.ppc64le.rpm
- openshift-ansible-3.11.104-1.git.0.379a011.el7.noarch.rpm
- atomic-enterprise-service-catalog-3.11.104-1.git.1.bd8f56a.el7.x86_64.rpm
- atomic-openshift-dockerregistry-3.11.104-1.git.1.b622210.el7.ppc64le.rpm
- atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.x86_64.rpm
- atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.ppc64le.rpm
- openshift-ansible-roles-3.11.104-1.git.0.379a011.el7.noarch.rpm
- cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.x86_64.rpm
- cri-o-debuginfo-1.11.13-1.rhaos3.11.gitfb88a9c.el7.ppc64le.rpm
- atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.x86_64.rpm
- atomic-openshift-service-idler-3.11.104-1.git.1.cd5cc68.el7.src.rpm
- atomic-openshift-cluster-autoscaler-3.11.104-1.git.1.1f9ff3f.el7.x86_64.rpm
- openshift-ansible-playbooks-3.11.104-1.git.0.379a011.el7.noarch.rpm
- atomic-enterprise-service-catalog-svcat-3.11.104-1.git.1.bd8f56a.el7.x86_64.rpm
- openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.ppc64le.rpm
- openshift-enterprise-autoheal-3.11.104-1.git.1.7633569.el7.src.rpm
- openshift-enterprise-cluster-capacity-3.11.104-1.git.1.fa31ddb.el7.src.rpm
- prometheus-3.11.104-1.git.1.66a69b4.el7.x86_64.rpm
- cri-o-1.11.13-1.rhaos3.11.gitfb88a9c.el7.src.rpm
- openshift-ansible-test-3.11.104-1.git.0.379a011.el7.noarch.rpm
- golang-github-openshift-oauth-proxy-3.11.104-1.git.1.a3cbeb1.el7.x86_64.rpm
- prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.x86_64.rpm
- atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.ppc64le.rpm
- openshift-ansible-3.11.104-1.git.0.379a011.el7.src.rpm
- prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.ppc64le.rpm
- prometheus-node-exporter-3.11.104-1.git.1.fb6869d.el7.ppc64le.rpm
- atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.src.rpm
- atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.src.rpm
- golang-github-prometheus-node_exporter-3.11.104-1.git.1.fb6869d.el7.src.rpm
- golang-github-prometheus-prometheus-3.11.104-1.git.1.66a69b4.el7.src.rpm
- prometheus-3.11.104-1.git.1.66a69b4.el7.ppc64le.rpm
- prometheus-node-exporter-3.11.104-1.git.1.fb6869d.el7.x86_64.rpm
- atomic-openshift-metrics-server-3.11.104-1.git.1.2f54d6c.el7.src.rpm
- atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.ppc64le.rpm
- golang-github-prometheus-alertmanager-3.11.104-1.git.1.be08f5f.el7.src.rpm
- atomic-enterprise-service-catalog-svcat-3.11.104-1.git.1.bd8f56a.el7.ppc64le.rpm
- atomic-openshift-descheduler-3.11.104-1.git.1.8dd10d5.el7.x86_64.rpm
- atomic-openshift-node-problem-detector-3.11.104-1.git.1.c7d7f22.el7.ppc64le.rpm
Fixes
- This content is not included.BZ - 1427274
- This content is not included.BZ - 1633892
- This content is not included.BZ - 1634151
- This content is not included.BZ - 1651393
- This content is not included.BZ - 1654044
- This content is not included.BZ - 1670418
- This content is not included.BZ - 1680063
- This content is not included.BZ - 1686025
- This content is not included.BZ - 1689000
- This content is not included.BZ - 1689848
- This content is not included.BZ - 1690605
- This content is not included.BZ - 1690900
- This content is not included.BZ - 1690951
- This content is not included.BZ - 1691893
- This content is not included.BZ - 1693035
- This content is not included.BZ - 1694106
- This content is not included.BZ - 1694131
- This content is not included.BZ - 1694704
- This content is not included.BZ - 1694899
- This content is not included.BZ - 1695271
- This content is not included.BZ - 1695856
- This content is not included.BZ - 1696198
- This content is not included.BZ - 1697169
- This content is not included.BZ - 1697295
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.