- Issued:
- 2020-09-21
- Updated:
- 2020-09-21
RHBA-2020:3719 - OpenShift Container Platform 4.5.11 bug fix update
Synopsis
OpenShift Container Platform 4.5.11 bug fix update
Type/Severity
Bug Fix Advisory None
Topic
Red Hat OpenShift Container Platform release 4.5.11 is now available with updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.5.11. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2020:3720
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html
This update fixes the following bugs among others:
-
Previously, when the KubletHealthState alert was firing for a kubelet, it would stay active even after the kubelet became healthy again. The only way to clear the alert was to restart the kubelet. The KubletHealthState alert is no longer sent once the kubelet is healthy. (BZ#1872337)
-
Previously, a hardcoded value was set when calculating the end of the DHCP allocation pool when provisioning the nodes subnet. This caused an error when deploying on an OpenShift Container Platform cluster on OpenStack with a machine CIDR smaller than 18. This bug fix removes hardcoding the number of nodes and, instead, dynamically calculates the end of the DHCP allocation pool. Now it is possible to deploy a cluster on OpenStack with a machine CIDR of any length, provided it is large enough for all required nodes. (BZ#1872629)
-
Previously, admin privileges for a namespace were required for users to import an image from it. This caused self-provisioned users to not successfully import images from another project for which they only had edit access. New RoleBindings were created for image-puller rights, allowing a user with edit access for the project to import or run an image from it. (BZ#1875858)
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.11-x86_64
The image digest is sha256:4d048ae1274d11c49f9b7e70713a072315431598b2ddbb512aee4027c422fe3e
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.11-s390x
The image digest is sha256:e4835d509fc6e22d3011fef367ae8d27b1ff038755031d52ed28d8d36ee3350d
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.11-ppc64le
The image digest is sha256:5aa58cfe6b7bea5769196e1b23caf54df715743d09e6de1cd8897f976ed9b635
All OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Solution
For OpenShift Container Platform 4.5 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-release-notes.html
Details on how to access this content are available at This page is not included, but the link has been rewritten to point to the nearest parent document.https://docs.openshift.com/container-platform/4.5/updating/updating-cluster-cli.html.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 4.5 | x86_64 |
| Red Hat OpenShift Container Platform | 4.5 | x86_64 |
| Red Hat OpenShift Container Platform for Power | 4.5 | ppc64le |
| Red Hat OpenShift Container Platform for Power | 4.5 | ppc64le |
| Red Hat OpenShift Container Platform for IBM Z and LinuxONE | 4.5 | s390x |
| Red Hat OpenShift Container Platform for IBM Z and LinuxONE | 4.5 | s390x |
Fixes
- This content is not included.BZ - 1850240
- This content is not included.BZ - 1855820
- This content is not included.BZ - 1858927
- This content is not included.BZ - 1862584
- This content is not included.BZ - 1868257
- This content is not included.BZ - 1870585
- This content is not included.BZ - 1870782
- This content is not included.BZ - 1870825
- This content is not included.BZ - 1872337
- This content is not included.BZ - 1872625
- This content is not included.BZ - 1872629
- This content is not included.BZ - 1874244
- This content is not included.BZ - 1874251
- This content is not included.BZ - 1874582
- This content is not included.BZ - 1874840
- This content is not included.BZ - 1874873
- This content is not included.BZ - 1875858
- This content is not included.BZ - 1876238
- This content is not included.BZ - 1877065
- This content is not included.BZ - 1877083
- This content is not included.BZ - 1877256
- This content is not included.BZ - 1877564
- This content is not included.BZ - 1878148
- This content is not included.BZ - 1878264
- This content is not included.BZ - 1879260
CVEs
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.