- Issued:
- 2019-08-28
- Updated:
- 2019-08-28
RHBA-2019:2547 - OpenShift Container Platform 4.1.13 bug fix update
Synopsis
OpenShift Container Platform 4.1.13 bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 4.1.13 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.1.13. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2019:2546
This release fixes the following bugs:
-
Kibana would present a blank page or time out errors due to too many calls to the ElasticSearch cluster. Now, caching of the API calls and dynamic seeding allows for more efficiency and reduces the opportunity for page timeouts. (BZ#1726434)
-
The drain process would not terminate the image registry pod properly. The registry process has been amended so that it now receives SIGTERM and properly evicts the image registry during the drain process. (BZ#1737379)
-
Openvswitch (OVS) was missing from the SDN as a result of an internal build issue. This has been resolved with this release. (BZ#1740264)
-
The default minimum install of Red Hat Enterprise Linux included firewalld.service, which blocks ports by default. Now, firewalld is disabled if installed. (BZ#1740964)
-
The samples operator was not setting the reason or message information it generated for various errors it detected on it's ClusterOperator object's Degraded condition. As a result, Useful diagnostic information on the samples operator was not readily available from the telemetry console. Now, the message information is not set on the ClusterOperator object's Degraded condition. Useful diagnostic information on the samples operator is now available from the telemetry console. (BZ#1742907)
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
You may download the oc tool and use it to inspect release image metadata as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.1.13
The image digest is sha256:212296a41e04176c308bfe169e7c6e05d77b76f403361664c3ce55cd30682a94
All OpenShift Container Platform 4.1 users are advised to upgrade to these updated packages and images.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
For OpenShift Container Platform 4.1 see the following documentation, which will be updated shortly for release 4.1.13, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html
Details on how to access this content are available at This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 4.1 | x86_64 |
Fixes
- This content is not included.BZ - 1696737
- This content is not included.BZ - 1707827
- This content is not included.BZ - 1711044
- This content is not included.BZ - 1712955
- This content is not included.BZ - 1714168
- This content is not included.BZ - 1723851
- This content is not included.BZ - 1725249
- This content is not included.BZ - 1726144
- This content is not included.BZ - 1726434
- This content is not included.BZ - 1726866
- This content is not included.BZ - 1728105
- This content is not included.BZ - 1731855
- This content is not included.BZ - 1732166
- This content is not included.BZ - 1732214
- This content is not included.BZ - 1732588
- This content is not included.BZ - 1732934
- This content is not included.BZ - 1733232
- This content is not included.BZ - 1733978
- This content is not included.BZ - 1734083
- This content is not included.BZ - 1734663
- This content is not included.BZ - 1735709
- This content is not included.BZ - 1737379
- This content is not included.BZ - 1739085
- This content is not included.BZ - 1739218
- This content is not included.BZ - 1739219
- This content is not included.BZ - 1739322
- This content is not included.BZ - 1740174
- This content is not included.BZ - 1740264
- This content is not included.BZ - 1740373
- This content is not included.BZ - 1740391
- This content is not included.BZ - 1740824
- This content is not included.BZ - 1740964
- This content is not included.BZ - 1741039
- This content is not included.BZ - 1741350
- This content is not included.BZ - 1741661
- This content is not included.BZ - 1741753
- This content is not included.BZ - 1741959
- This content is not included.BZ - 1742907
- This content is not included.BZ - 1743293
CVEs
- CVE-2016-3186
- CVE-2016-3616
- CVE-2016-10166
- CVE-2016-10713
- CVE-2016-10739
- CVE-2017-9118
- CVE-2017-9120
- CVE-2017-12932
- CVE-2017-14503
- CVE-2017-16642
- CVE-2018-0495
- CVE-2018-0734
- CVE-2018-1122
- CVE-2018-3058
- CVE-2018-3063
- CVE-2018-3066
- CVE-2018-3081
- CVE-2018-3282
- CVE-2018-5711
- CVE-2018-5712
- CVE-2018-5741
- CVE-2018-6952
- CVE-2018-7456
- CVE-2018-7584
- CVE-2018-7755
- CVE-2018-8087
- CVE-2018-8905
- CVE-2018-9363
- CVE-2018-9516
- CVE-2018-9517
- CVE-2018-10545
- CVE-2018-10546
- CVE-2018-10547
- CVE-2018-10548
- CVE-2018-10549
- CVE-2018-10779
- CVE-2018-10853
- CVE-2018-10963
- CVE-2018-11212
- CVE-2018-11213
- CVE-2018-11214
- CVE-2018-11813
- CVE-2018-12404
- CVE-2018-12641
- CVE-2018-12697
- CVE-2018-12900
- CVE-2018-13053
- CVE-2018-13093
- CVE-2018-13094
- CVE-2018-13095
- CVE-2018-14348
- CVE-2018-14498
- CVE-2018-14598
- CVE-2018-14599
- CVE-2018-14600
- CVE-2018-14625
- CVE-2018-14647
- CVE-2018-14734
- CVE-2018-14851
- CVE-2018-14884
- CVE-2018-15473
- CVE-2018-15594
- CVE-2018-15853
- CVE-2018-15854
- CVE-2018-15855
- CVE-2018-15856
- CVE-2018-15857
- CVE-2018-15859
- CVE-2018-15861
- CVE-2018-15862
- CVE-2018-15863
- CVE-2018-15864
- CVE-2018-16062
- CVE-2018-16402
- CVE-2018-16403
- CVE-2018-16658
- CVE-2018-16842
- CVE-2018-16885
- CVE-2018-17082
- CVE-2018-17100
- CVE-2018-17101
- CVE-2018-18074
- CVE-2018-18281
- CVE-2018-18310
- CVE-2018-18384
- CVE-2018-18520
- CVE-2018-18521
- CVE-2018-18557
- CVE-2018-18661
- CVE-2018-20783
- CVE-2018-1000169
- CVE-2018-1000876
- CVE-2018-1000877
- CVE-2018-1000878
- CVE-2019-1559
- CVE-2019-2503
- CVE-2019-2529
- CVE-2019-2614
- CVE-2019-2627
- CVE-2019-2745
- CVE-2019-2762
- CVE-2019-2769
- CVE-2019-2786
- CVE-2019-2816
- CVE-2019-2842
- CVE-2019-3459
- CVE-2019-3460
- CVE-2019-3858
- CVE-2019-3861
- CVE-2019-3882
- CVE-2019-3900
- CVE-2019-5010
- CVE-2019-5489
- CVE-2019-6977
- CVE-2019-7149
- CVE-2019-7150
- CVE-2019-7222
- CVE-2019-7664
- CVE-2019-7665
- CVE-2019-9020
- CVE-2019-9021
- CVE-2019-9022
- CVE-2019-9023
- CVE-2019-9024
- CVE-2019-9637
- CVE-2019-9638
- CVE-2019-9639
- CVE-2019-9640
- CVE-2019-9740
- CVE-2019-9947
- CVE-2019-9948
- CVE-2019-10216
- CVE-2019-10352
- CVE-2019-10353
- CVE-2019-10354
- CVE-2019-11034
- CVE-2019-11035
- CVE-2019-11036
- CVE-2019-11038
- CVE-2019-11039
- CVE-2019-11040
- CVE-2019-11599
- CVE-2019-11810
- CVE-2019-11833
- CVE-2019-1000019
- CVE-2019-1000020
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.