Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2016:0293 - Bug Fix Advisory
Issued:
2016-02-23
Updated:
2016-02-23

RHBA-2016:0293 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

Red Hat OpenShift Enterprise bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated atomic-openshift packages that fix several bugs are now available for Red Hat OpenShift Enterprise 3.1.

Description

OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

This update fixes the following bugs:

  • Previously, secrets were updated for the internal OAuth clients on every startup. This caused problems when retrieving tokens in highly-available (HA) environments, yielding the error "Invalid status code (400): 400 Bad Request". This bug fix preserves existing client secrets and now OpenShift Enterprise updates only the challenge and redirect URI settings on startup. (BZ#1302946)
  • Pods using the host network interface, such as the default HAProxy router, were getting the default IP from the node entry for their liveness probe. In some common misconfigurations, this IP would not actually be physically present on the node running the probes, and therefore would not be short-circuited to use the loopback interface. In those cases, the probes would fail unless a cluster administrator manually opened up port 1936 to allow the probe to pass. This bug fix updates the router to use localhost for liveness and readiness probes, and the OpenShift Enterprise installer now ensures that `openshift_hostname` variables in inventory files resolve to an IP address on the host in question. If it detects that the host name does not, it pauses the installation waiting for the user to abort or continue. This behavior can be overridden by setting `openshift_override_hostname_check=true`, which will simply pause the installation for 10 seconds then move on. (BZ#1293578)
  • When restarting all masters in large clusters at the same time, one or all could fail with an "Unable to perform initial IP allocation check" error. This was due to a race condition between the service IP allocator and updates to services. This bug fix adds a retry loop on such conflicts, and as a result the master services can be started successfully. BZ#1294864)
  • The default mode for the kubelet proxy on nodes was recently changed from userspace to iptables, causing the node to start in iptables mode by default. This bug fix adds the ability to configure this proxy mode by setting the `proxyArguments.proxy-mode` parameter in the node configuration file (/etc/origin/node/node-config.yaml) to either `iptables` or `userspace`. Restart the atomic-openshift-node service for any changes to take effect. (BZ#1308701)
  • Previously, when an AWS EBS volume was detached from a pod, it could not be attached to different pod on the same node. This bug fix updates the AWS provider to ensure that when detaching an AWS volume it is removed from the internal cache of attached volumes. As a result, subsequent requests can attach it again. (BZ#1304752)

All OpenShift Enterprise 3 users are advised to upgrade to these updated packages.

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

After ensuring all packages on each host have been updated, restart the atomic-openshift-master service on each master to complete this update.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.

Affected Products

  • Red Hat OpenShift Container Platform 3.1 x86_64

Fixes

  • BZ - 1293578 - Ansible should open port '1936' in iptables
  • BZ - 1294864 - atomic-openshift-master-api fails when all are restarted together
  • BZ - 1302946 - Sometime can't get token when access token/request api in v3 stage env
  • BZ - 1308701 - Kubelet proxy must be able to run in userspace and iptables mode

CVEs

(none)

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Container Platform 3.1

SRPM
atomic-openshift-3.1.1.6-3.git.16.5327e56.el7aos.src.rpm SHA-256: c3efc3bad3812fef7f6a0577bbefaff6cf3bc525e423ab7dc52db242be38431d
x86_64
atomic-openshift-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: 1aa25fea36d36e94fffa2fd15a74dbb79374a2c76004b0cb16f07b42fdc89df6
atomic-openshift-clients-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: c068af54227321fe2cf89df73f2bc1cda1de43eb9a8f62eafebb0db3220a4412
atomic-openshift-clients-redistributable-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: 3e9ab404375ec373a823daee5422f5e0a10473ae30077f928390d13512f65eb7
atomic-openshift-dockerregistry-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: c896ce66e0dbea48a54434195bfcbfb8cc8faa05423d2128fd493e989c84c040
atomic-openshift-master-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: e96d84be6aac55d0db49cdf4ae83af229ed03c1ce632c2c317eeefab28b6acb7
atomic-openshift-node-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: f1924b3ffc719989adfdab6e982cc62574b2812064bcb53e53efc181176b3388
atomic-openshift-pod-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: 1ffae6a2823d93ac403cdd1f93bc79460a6985ab3c42c4f9bcdf816f7d08a931
atomic-openshift-recycle-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: 3ffe354892521406e4a3f0bbd890193797510b0f409b78a793007637c57827d3
atomic-openshift-sdn-ovs-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: cc7f41ff6ee2cab5a7f24410d2daa55b8fcff0bb577719dd95baad59b6c84498
tuned-profiles-atomic-openshift-node-3.1.1.6-3.git.16.5327e56.el7aos.x86_64.rpm SHA-256: 2a45f0a6a7083917f0806e600d91433c7c7e55fbd8b3511b31be09b34b87573c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility