Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2014:0598 - Bug Fix Advisory
Issued:
2014-06-04
Updated:
2014-06-04

RHBA-2014:0598 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat OpenShift Enterprise 1.2.8 bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Enterprise release 1.2.8 is now available with updates to
packages that fix several bugs and introduce a feature enhancement. This update
adds necessary support for software dependencies that will change with the
upcoming release of Red Hat Software Collections (SCL) version 1.1.

Description

OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud
deployments.

This update fixes the following bugs:

  • When using unauthenticated DNS updates, the oo-accept-broker and

oo-register-dns commands would fail, even though the dns-nsupdate plug-in
already supported unauthenticated DNS. This bug fix updates the logic for both
commands to support unauthenticated DNS, and these commands no longer fail as a
result. (BZ#1007700)

  • SSH keys with the name "." or ".." were misinterpreted by the REST API, and as

a result these keys could not be deleted. To avoid these deletion issues, this
bug fix updates the SSH key validation to prevent the addition of keys with
names beginning with ".". (BZ#1018642)

  • After installing a custom or community cartridge using the oo-admin-cartridge

command and clearing the broker cache, the oo-accept-systems command reported
inconsistent cartridge lists between the broker and nodes. This was due to the
new cartridge receiving a problematic SELinux context during its installation
into the cartridge repository. This bug fix ensures that cartridges installed
using oo-admin-cartridge are relabeled using the default contexts, and
oo-accept-systems no longer reports inconsistent cartridge lists. (BZ#1053029)

This update also adds the following enhancement:

  • This update adds necessary support for software dependencies that will change

with the upcoming release of Red Hat Software Collections (SCL) version 1.1 by
updating several OpenShift Enterprise components. (BZ#1093808)

All users of OpenShift Enterprise 1.2 are advised to upgrade to these updated
packages.

Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258.

After running the yum update command on each host and ensuring all packages have
been updated, restart the mcollective service on each node host:

# service mcollective restart

On the broker host, restart the broker service and, if installed, the console
service:

# service openshift-broker restart
# service openshift-console restart

Clear the broker cache and, if installed, the console cache:

# oo-admin-broker-cache --console

Affected Products

  • Red Hat OpenShift Enterprise Infrastructure 1.2 x86_64
  • Red Hat OpenShift Enterprise Application Node 1.2 x86_64

Fixes

  • BZ - 1007700 - oo-accept-broker and oo-register-dns will fail when using unauthenticated DNS updates
  • BZ - 1018642 - Failed to delete the ssh key with name "."
  • BZ - 1093808 - LD_LIBRARY_PATH updates required for v8 collection change

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Enterprise Infrastructure 1.2

SRPM
openshift-enterprise-upgrade-1.2.7.1-1.el6op.src.rpm SHA-256: d3345a2be7094cee6bf0f88b7b4baaeb4f1db0ef8420d49d24b5b679dbc63843
openshift-origin-broker-1.5.10.1-1.el6op.src.rpm SHA-256: 54e9fe317925cbc7eb25f6b59f7cc5bea0132b1013bd79039399a0bb19fd70c1
openshift-origin-broker-util-1.9.17.1-1.el6op.src.rpm SHA-256: 1eed9b6967c52620d63a8b7be6cb3040ef1a87f786c2682cb516b9d4403e203e
openshift-origin-console-1.5.25.1-1.el6op.src.rpm SHA-256: 4f6ed914002264f81756b98f4f2dd50bbf2461e9077b1b233953f78fc0fe7278
openshift-origin-util-scl-1.4.1.2-1.el6op.src.rpm SHA-256: af9d66dfc706f77aaece7abff115ea70c0f69bec5aa588905512900bd8a6e1e3
rubygem-openshift-origin-common-1.8.18.1-1.el6op.src.rpm SHA-256: 04666b44fca023f146e36ee1e25a2277a95becef6af8be82768b83c627b50de7
rubygem-openshift-origin-controller-1.9.16.3-1.el6op.src.rpm SHA-256: 3c29c31a7d2339926623d8845ed4239ad38408f71aec8e2da586cfcc16e77727
x86_64
openshift-enterprise-release-1.2.7.1-1.el6op.noarch.rpm SHA-256: 98b41293bd2096026bd5ce1643b811bec7356a036eb4de5bdc57ded8ad8f694c
openshift-enterprise-upgrade-broker-1.2.7.1-1.el6op.noarch.rpm SHA-256: 1331fcb12df7427f0eaf71efccc19a639835dbbbf15966783025eb6013bd10ea
openshift-enterprise-yum-validator-1.2.7.1-1.el6op.noarch.rpm SHA-256: a07376508cb4712a06d5e2713bc4cdf1389e7a72f0d7c68ea2fd690008de4400
openshift-origin-broker-1.5.10.1-1.el6op.noarch.rpm SHA-256: 3e5face06210b2c5cdc23060a1a6ee44339429bc30e99e09f540afabe143f06b
openshift-origin-broker-util-1.9.17.1-1.el6op.noarch.rpm SHA-256: e60cb31c877ec36d2d524c4bd55479e31e4706cba5fa77a16ee7637ccccff7f5
openshift-origin-console-1.5.25.1-1.el6op.noarch.rpm SHA-256: b4b45806deb5813b1e5180b718477dd245c238a8dc4cbe476972bfc64690b684
openshift-origin-util-scl-1.4.1.2-1.el6op.noarch.rpm SHA-256: b524f18a29f7be6cad97433b8413480a79ed5a26ef74dce470151e922644b4be
rubygem-openshift-origin-common-1.8.18.1-1.el6op.noarch.rpm SHA-256: efae019fb01e1a88c5c119318fc89dd956ce376701cdbfd8fc93ddad1ef08f67
rubygem-openshift-origin-controller-1.9.16.3-1.el6op.noarch.rpm SHA-256: aac2e491e484e62f531478450904f230e40007be42ece2549ffc43b3368f28a1

Red Hat OpenShift Enterprise Application Node 1.2

SRPM
openshift-enterprise-upgrade-1.2.7.1-1.el6op.src.rpm SHA-256: d3345a2be7094cee6bf0f88b7b4baaeb4f1db0ef8420d49d24b5b679dbc63843
openshift-origin-cartridge-ruby-0.4.10.5-1.el6op.src.rpm SHA-256: 6c266ce200520963177c8cb2bb8065f9482692d2ff41ba5a20a7120d1f93b121
openshift-origin-util-scl-1.4.1.2-1.el6op.src.rpm SHA-256: af9d66dfc706f77aaece7abff115ea70c0f69bec5aa588905512900bd8a6e1e3
rubygem-openshift-origin-common-1.8.18.1-1.el6op.src.rpm SHA-256: 04666b44fca023f146e36ee1e25a2277a95becef6af8be82768b83c627b50de7
rubygem-openshift-origin-node-1.9.14.7-1.el6op.src.rpm SHA-256: 2004121cf4a7b79e961ffe21205b5a9a05403255ddec4b2f71716264014702e8
x86_64
openshift-enterprise-release-1.2.7.1-1.el6op.noarch.rpm SHA-256: 98b41293bd2096026bd5ce1643b811bec7356a036eb4de5bdc57ded8ad8f694c
openshift-enterprise-upgrade-node-1.2.7.1-1.el6op.noarch.rpm SHA-256: 5c38570f33586a32abf6c8da473a20eca0e161ce313b4939c55f63ae4bd62eed
openshift-enterprise-yum-validator-1.2.7.1-1.el6op.noarch.rpm SHA-256: a07376508cb4712a06d5e2713bc4cdf1389e7a72f0d7c68ea2fd690008de4400
openshift-origin-cartridge-ruby-0.4.10.5-1.el6op.noarch.rpm SHA-256: 58fc47a071981d23ec336b094d88315c635f1a1611a3f47d41dd34dd935f2b8d
openshift-origin-util-scl-1.4.1.2-1.el6op.noarch.rpm SHA-256: b524f18a29f7be6cad97433b8413480a79ed5a26ef74dce470151e922644b4be
rubygem-openshift-origin-common-1.8.18.1-1.el6op.noarch.rpm SHA-256: efae019fb01e1a88c5c119318fc89dd956ce376701cdbfd8fc93ddad1ef08f67
rubygem-openshift-origin-node-1.9.14.7-1.el6op.noarch.rpm SHA-256: 00170bf61138617a85c48645761f01e98c8e7ce2305db331df86e95f41ab78fe

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility