- Issued:
- 2019-07-22
- Updated:
- 2019-07-22
RHBA-2019:1767 - OpenShift Container Platform 4.1.6 bug fix update
Synopsis
OpenShift Container Platform 4.1.6 bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 4.1.6 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.1.6. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2019:1766
This update fixes the following bugs:
-
Previously, a service would not correctly show up in the project overview when it selected the
deploymentconfiglabel that is automatically set for pods created by a deployment config. Now, the services that select thedeploymentconfiglabel are correctly shown on the overview. (BZ#1717535) -
Overlapping text would sometimes appear in the web console machine config table. This has been correct and text now wraps correctly. (BZ#1720161)
-
Operators would use
Secret.StringDatathat were write-only to retrieve data. As a result, the operator did not retrieve the real data in the secret. Now,Secret.Datais used instead and the operator is able to read the values. (BZ#1720270) -
The metrics charts on the node page could incorrectly total usage for more than one node in some circumstances. Now, the node page charts correctly display the usage for only the specific node. (BZ#1721146)
-
The web console create route form incorrectly stated that route hostnames cannot be changed after creation. This is variable based on user permissions. The incorrect help text has been removed. (BZ#1722225)
-
The ca.crt value for OpenID identity providers was not set properly when created through the web console. The problem has been fixed, and the ca.crt is now correctly set. (BZ#1727308)
All OpenShift Container Platform 4.1 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
For OpenShift Container Platform 4.1 see the following documentation, which will be updated shortly for release 4.1.6, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html
Details on how to access this content are available at This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 4.1 | x86_64 |
| Red Hat OpenShift Container Platform | 4.1 | x86_64 |
Updated Packages
- openshift-clients-4.1.6-201907090427.git.0.d3fa8d1.el7.x86_64.rpm
- atomic-enterprise-service-catalog-4.1.6-201907090827.git.1.bd06019.el7.src.rpm
- atomic-enterprise-service-catalog-4.1.6-201907090827.git.1.bd06019.el7.x86_64.rpm
- openshift-clients-redistributable-4.1.6-201907090427.git.0.d3fa8d1.el8.x86_64.rpm
- openshift-ansible-4.1.6-201907070809.git.158.cff9843.el7.src.rpm
- openshift-hyperkube-4.1.6-201907090427.git.0.d3fa8d1.el8.x86_64.rpm
- openshift-ansible-4.1.6-201907070809.git.158.cff9843.el7.noarch.rpm
- openshift-hyperkube-4.1.6-201907090427.git.0.d3fa8d1.el7.x86_64.rpm
- openshift-4.1.6-201907090427.git.0.d3fa8d1.el8.src.rpm
- openshift-clients-redistributable-4.1.6-201907090427.git.0.d3fa8d1.el7.x86_64.rpm
- openshift-4.1.6-201907090427.git.0.d3fa8d1.el7.src.rpm
- openshift-clients-4.1.6-201907090427.git.0.d3fa8d1.el8.x86_64.rpm
- atomic-enterprise-service-catalog-svcat-4.1.6-201907090827.git.1.bd06019.el7.x86_64.rpm
Fixes
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.