- Issued:
- 2019-06-26
- Updated:
- 2019-06-26
RHBA-2019:1590 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 4.1.3 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Red Hat OpenShift Container Platform release 4.1.3 is now available with
updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.1.3. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2019:1589
This update fixes the following bugs:
- In OpenShift Docker builds, `.dockerignore` files were not processed
before content was sent to the Docker daemon. As a result, images included
content that should have been excluded. Now, the engine for building
container images was switched to `buildah` and `.dockerignore` files in
source repositories are respected during Docker strategy builds.
(BZ#1487356)
- A white screen with no error message would appear in the web console if
trying to create an operator resource immediately after installing an
operator through Operator Hub. Now, an error message is presented in the
web console if trying to create a resource before it is available.
(BZ#1709964)
- Environment variables were not properly escaped in the source-to-image
generated Dockerfile. As a result, source strategy builds, which included
shell variables, would fail. Now, environment variables are properly
escaped when the Dockerfile is consumed by buildah. Builds can now use
shell variables as an environment variable value. (BZ#1713681)
- Previously, the web console `NetworkPolicy` YAML template
`api-allow-http-and-https` was incorrect and couldn't be created without
modifications. This has been fixed, and the template now works as intended.
(BZ#1717996)
- The web console `NetworkPolicy` YAML template `web-allow-production` had
incorrect indentation, preventing it from being created successfully. The
indentation has been fixed, and the YAML template now works as intended.
(BZ#1717997)
- A race condition existed between the MCO and the growpart service. As a
result, bootstrapping would fail. Now, the growpart service has been
updated to start before `kubelet.service` and the race condition is
averted. (BZ#1720872)
All OpenShift Container Platform 4.1 users are advised to upgrade to these
updated packages and images.
Solution
Before applying this update, ensure all previously released errata
relevant to your system have been applied.
For OpenShift Container Platform 4.1 see the following documentation, which
will be updated shortly for release 4.1.3, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html
This update is available via Red Hat Subscription Management (RHSM)
service. Details on how to access this content are available at
https://access.redhat.com/articles/11258.
Affected Products
- Red Hat OpenShift Container Platform 4.1 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.1 for RHEL 7 x86_64
Fixes
- BZ - 1722702 - Placeholder for 4.1.3 RPM release
CVEs
(none)
References
(none)
Red Hat OpenShift Container Platform 4.1 for RHEL 8
SRPM | |
---|---|
open-vm-tools-10.3.10-2.el8.src.rpm | SHA-256: 70d9780b37658ecb108e0921fed556332bc7f01930264be06697ab95c70ff481 |
openshift-4.1.3-201906191252.git.0.9b19d73.el8.src.rpm | SHA-256: 6df414131458879c6d60301f52b7724819b819b314e4877e70b668884b92dcb5 |
x86_64 | |
open-vm-tools-10.3.10-2.el8.x86_64.rpm | SHA-256: bdcf50130dd2708a8cfe19cbf48eb6cc107c58ed276f835757dbcdc59ed6d099 |
openshift-clients-4.1.3-201906191252.git.0.9b19d73.el8.x86_64.rpm | SHA-256: e3fa80d6376db2c5faa9ec66903d58fa181769a54849c230bc054c315e4a9853 |
openshift-clients-redistributable-4.1.3-201906191252.git.0.9b19d73.el8.x86_64.rpm | SHA-256: 8cb5b9488b5399c27321f6f98d1e5eebaf083d3fa0c92c01125eac568376653d |
openshift-hyperkube-4.1.3-201906191252.git.0.9b19d73.el8.x86_64.rpm | SHA-256: 1bf6bd6fcc49edcab9a628b9878080f8556e97c4e0a312a52316f7aecf62ef20 |
Red Hat OpenShift Container Platform 4.1 for RHEL 7
SRPM | |
---|---|
atomic-enterprise-service-catalog-4.1.3-201906191252.git.1.450cfb6.el7.src.rpm | SHA-256: 2396de10a12449f85623996e88444e14ab23c3247273973def0a1dfe5b3328f8 |
openshift-4.1.3-201906191252.git.0.9b19d73.el7.src.rpm | SHA-256: e51891ad4d90fc3fed3db21f24bf8c38cd8603a1722706fe51e2b9f19aefff67 |
x86_64 | |
atomic-enterprise-service-catalog-4.1.3-201906191252.git.1.450cfb6.el7.x86_64.rpm | SHA-256: 76463e0858b8e8badbb7a6facfd344570b22549d122da8a0c4b71320e22f05b2 |
atomic-enterprise-service-catalog-svcat-4.1.3-201906191252.git.1.450cfb6.el7.x86_64.rpm | SHA-256: 03d0cf748dd1452ae03feda10d864ef28929e5c627bd12b03cc5a71cca202de3 |
openshift-clients-4.1.3-201906191252.git.0.9b19d73.el7.x86_64.rpm | SHA-256: cd99aa019c6c4deffd6debd6d9cfe507fccd352079fcf1e2be717a08f72640ec |
openshift-clients-redistributable-4.1.3-201906191252.git.0.9b19d73.el7.x86_64.rpm | SHA-256: 3aad1293d97e9ea9f0f4e455d6e138ddafa6a35ec5fe5e0c2c6bb32bf356c8b2 |
openshift-hyperkube-4.1.3-201906191252.git.0.9b19d73.el7.x86_64.rpm | SHA-256: 9ce00155f187f8b9f8a5c9373eb207032cda2ca16da632f91fe4b96ad3a9f41b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.