- Issued:
- 2017-01-18
- Updated:
- 2017-01-18
RHBA-2017:0067 - Bug Fix Advisory
Synopsis
Red Hat OpenShift Container Platform 3.4 Image Release Advisory
Type/Severity
Bug Fix Advisory
Topic
Updated container images for Red Hat OpenShift Container Platform 3.4, which fixes several bugs and includes various enhancements, are now available.
Description
Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The OpenShift Container Platform 3.4 Release Notes provide information about new features, bug fixes, and known issues:
https://docs.openshift.com/container-platform/3.4/release_notes/ocp_3_4_release_notes.html
This advisory contains the container images for this release. See the following advisory for the RPM packages and full list of bug fixes and enhancements for this release:
https://access.redhat.com/errata/RHBA-2017:0066
This update includes the following images:
openshift3/image-inspector:2.1-6
openshift3/jenkins-1-rhel7:1.651.2-46
openshift3/jenkins-2-rhel7:2.19-13
openshift3/jenkins-slave-base-rhel7:1.0-11
openshift3/jenkins-slave-maven-rhel7:3.3-12
openshift3/jenkins-slave-nodejs-rhel7:4-11
openshift3/logging-auth-proxy:3.4.0-7
openshift3/logging-curator:3.4.0-6
openshift3/logging-deployer:v3.4.0.39-2
openshift3/logging-elasticsearch:3.4.0-13
openshift3/logging-fluentd:3.4.0-11
openshift3/logging-kibana:3.4.0-11
openshift3/metrics-cassandra:3.4.0-6
openshift3/metrics-deployer:v3.4.0.39-2
openshift3/metrics-hawkular-metrics:3.4.0-12
openshift3/metrics-heapster:3.4.0-6
openshift3/mongodb-24-rhel7:2.4-36
openshift3/mysql-55-rhel7:5.5-35
openshift3/nodejs-010-rhel7:0.10-47
openshift3/node:v3.4.0.39-2
openshift3/openvswitch:v3.4.0.39-2
openshift3/ose-deployer:v3.4.0.39-2
openshift3/ose-docker-builder:v3.4.0.39-2
openshift3/ose-docker-registry:v3.4.0.39-2
openshift3/ose-egress-router:v3.4.0.39-2
openshift3/ose-f5-router:v3.4.0.39-2
openshift3/ose-haproxy-router:v3.4.0.39-2
openshift3/ose-keepalived-ipfailover:v3.4.0.39-2
openshift3/ose-pod:v3.4.0.39-2
openshift3/ose-recycler:v3.4.0.39-2
openshift3/ose-sti-builder:v3.4.0.39-2
openshift3/ose:v3.4.0.39-2
openshift3/perl-516-rhel7:5.16-49
openshift3/php-55-rhel7:5.5-47
openshift3/postgresql-92-rhel7:9.2-35
openshift3/python-33-rhel7:3.3-50
openshift3/registry-console:3.4-2
openshift3/ruby-20-rhel7:2.0-46
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
For instructions on new installations, see the following documentation:
https://docs.openshift.com/container-platform/3.4/install_config/install/planning.html
For instructions on how to properly upgrade existing clusters to OpenShift Container Platform 3.4, see the following documentation:
https://docs.openshift.com/container-platform/3.4/install_config/upgrading/
Affected Products
- Red Hat OpenShift Container Platform 3.4 x86_64
Fixes
- BZ - 1383455 - OpenShift Container Platform 3.4.0 images
- BZ - 1394675 - kubernetes: Only set websocket protocols if we actually have them
- BZ - 1401430 - Sometimes, logout link is missing in kibana UI Discover tab
- BZ - 1402592 - MAVEN_VERSION set incorrectly in openshift3/jenkins-slave-maven-rhel7 image
CVEs
- CVE-2013-5653
- CVE-2015-5174
- CVE-2015-5345
- CVE-2015-5351
- CVE-2016-0706
- CVE-2016-0714
- CVE-2016-0718
- CVE-2016-0763
- CVE-2016-1000022
- CVE-2016-1000023
- CVE-2016-1248
- CVE-2016-1669
- CVE-2016-2100
- CVE-2016-2149
- CVE-2016-2160
- CVE-2016-2834
- CVE-2016-3092
- CVE-2016-3107
- CVE-2016-3108
- CVE-2016-3111
- CVE-2016-3112
- CVE-2016-3190
- CVE-2016-3492
- CVE-2016-3711
- CVE-2016-3728
- CVE-2016-4455
- CVE-2016-4971
- CVE-2016-5011
- CVE-2016-5180
- CVE-2016-5285
- CVE-2016-5325
- CVE-2016-5384
- CVE-2016-5419
- CVE-2016-5420
- CVE-2016-5423
- CVE-2016-5424
- CVE-2016-5542
- CVE-2016-5554
- CVE-2016-5573
- CVE-2016-5582
- CVE-2016-5597
- CVE-2016-5612
- CVE-2016-5616
- CVE-2016-5617
- CVE-2016-5624
- CVE-2016-5626
- CVE-2016-5629
- CVE-2016-5636
- CVE-2016-6313
- CVE-2016-6662
- CVE-2016-6663
- CVE-2016-6664
- CVE-2016-6828
- CVE-2016-7099
- CVE-2016-7117
- CVE-2016-7141
- CVE-2016-7545
- CVE-2016-7977
- CVE-2016-7978
- CVE-2016-7979
- CVE-2016-8283
- CVE-2016-8602
- CVE-2016-8635
- CVE-2016-8864
- CVE-2016-9555
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.