- Issued:
- 2020-05-13
- Updated:
- 2020-05-13
RHBA-2020:2023 - OpenShift Container Platform 4.2.33 bug fix update
Synopsis
OpenShift Container Platform 4.2.33 bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 4.2.33 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.2.33. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2020:2022
This update fixes the following bugs:
-
The data in the journald for facility values was not sanitized. As a result, fluentd would emit error messages at the wrong level, causing confusion to users. Now, fluentd logs at the proper debug level. (BZ#1756072)
-
The NodeCA daemon did not tolerate NoSchedule, and could not be deployed on tainted nodes. Now, NodeCA tolerates NoSchedule and the daemon can manage certificates on nodes with NoSchedule options. (BZ#1808433)
-
The NodeCA daemon did not tolerate the NoExecute taint, and could not manage certificates properly on tainted nodes. Now, all taints are tolerated and are synced to all nodes with any taints. (BZ#1820243)
-
The OpenStack IPI installer created Security groups using
remote_group_idto allow traffic origins. Usingremote_group_idin the security rules causes a lot of computation by the OVS agent to generate the flows and possibly exceeding the time allocated for flow generation. In such cases, especially in environments already under stress, masters nodes were unable to communicate with worker nodes, leading the deployment to fail. Now, IP prefixes are used for whitelisting traffic origins intsead ofremote_group_id. (BZ#1827795)
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.33
The image digest is sha256:52e780ccc7e3af73b11dcb4afe275e2e743b59ccea6f228089ac93337de244d7
All OpenShift Container Platform 4.2 users are advised to upgrade to these updated packages and images.
Solution
For OpenShift Container Platform 4.2 see the following documentation, which will be updated shortly for release 4.2.33, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html
Details on how to access this content are available at This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/4.2/updating/updating-cluster-cli.html.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 4.2 | x86_64 |
| Red Hat OpenShift Container Platform | 4.2 | x86_64 |
| Red Hat OpenShift Container Platform for IBM Z and LinuxONE | 4.2 | s390x |
| Red Hat OpenShift Container Platform for IBM Z and LinuxONE | 4.2 | s390x |
Fixes
- This content is not included.BZ - 1718819
- This content is not included.BZ - 1756072
- This content is not included.BZ - 1768901
- This content is not included.BZ - 1769992
- This content is not included.BZ - 1785219
- This content is not included.BZ - 1795312
- This content is not included.BZ - 1803216
- This content is not included.BZ - 1807294
- This content is not included.BZ - 1808433
- This content is not included.BZ - 1814012
- This content is not included.BZ - 1816389
- This content is not included.BZ - 1820243
- This content is not included.BZ - 1820543
- This content is not included.BZ - 1824234
- This content is not included.BZ - 1824236
- This content is not included.BZ - 1824237
- This content is not included.BZ - 1826181
- This content is not included.BZ - 1827795
- This content is not included.BZ - 1829028
CVEs
- CVE-2020-2754
- CVE-2020-2755
- CVE-2020-2756
- CVE-2020-2757
- CVE-2020-2767
- CVE-2020-2773
- CVE-2020-2778
- CVE-2020-2781
- CVE-2020-2800
- CVE-2020-2803
- CVE-2020-2805
- CVE-2020-2816
- CVE-2020-2830
- CVE-2020-5260
- CVE-2020-10968
- CVE-2020-10969
- CVE-2020-11111
- CVE-2020-11112
- CVE-2020-11113
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.