- Issued:
- 2019-08-15
- Updated:
- 2019-08-15
RHBA-2019:2417 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 4.1.11 bug fix update
Type/Severity
Bug Fix Advisory
Topic
Red Hat OpenShift Container Platform release 4.1.11 is now available with
updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat
OpenShift Container Platform 4.1.11. See the following advisory for the
RPM packages for this release:
https://access.redhat.com/errata/RHBA-2019:2416
This release fixes the following bugs:
- Kibana would present a blank page or the page would time out. This was due to a large number of projects making too many called to the ElasticSearch cluster. As a result, the ElasticSearch calls would time out before a response could be returned to Kibana. Now, API calls are cached and dynamic seeding is more efficient, reducing the opportunity for page timeouts. (BZ#1726434)
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel ease-notes.html
You may download the oc tool and use it to inspect release image metadata
as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.1.11
The image digest is sha256:bfca31dbb518b35f312cc67516fa18aa40df9925dc84fdbcd15f8bbca425d7ff
All OpenShift Container Platform 4.1 users are advised to upgrade to these
updated packages and images.
Solution
Before applying this update, ensure all previously released errata
relevant to your system have been applied.
For OpenShift Container Platform 4.1 see the following documentation, which
will be updated shortly for release 4.1.11, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.
Affected Products
- Red Hat OpenShift Container Platform 4.1 for RHEL 7 x86_64
Fixes
- BZ - 1710168 - [e2e] Attach followed by a detach of same volume is stuck waiting for volume attachment on old device path
- BZ - 1710973 - "oc adm must-gather" test in e2e-vsphere suite failing in origin repo
- BZ - 1722096 - marketplace operator segfault
- BZ - 1730413 - 4.1 etcd clusters are reporting a down "etcd" service, but no alert is firing on the cluster
- BZ - 1731827 - [4.1.7] [Regression]"server returned HTTP status 500 Internal Server Error" for some kubelet endpoints
- BZ - 1736480 - Backport: Add coreos-update-ca-trust.service
- BZ - 1737526 - [4.1.z] Should gracefully exit when try to delete configs.imageregistry.operator.openshift.io
CVEs
- CVE-2016-3186
- CVE-2016-3616
- CVE-2016-10739
- CVE-2017-14503
- CVE-2018-0495
- CVE-2018-0734
- CVE-2018-1122
- CVE-2018-3058
- CVE-2018-3063
- CVE-2018-3066
- CVE-2018-3081
- CVE-2018-3282
- CVE-2018-5741
- CVE-2018-7409
- CVE-2018-7456
- CVE-2018-7485
- CVE-2018-7755
- CVE-2018-8087
- CVE-2018-8905
- CVE-2018-9363
- CVE-2018-9516
- CVE-2018-9517
- CVE-2018-10779
- CVE-2018-10853
- CVE-2018-10963
- CVE-2018-11212
- CVE-2018-11213
- CVE-2018-11214
- CVE-2018-11813
- CVE-2018-12404
- CVE-2018-12641
- CVE-2018-12697
- CVE-2018-12900
- CVE-2018-13053
- CVE-2018-13093
- CVE-2018-13094
- CVE-2018-13095
- CVE-2018-14348
- CVE-2018-14498
- CVE-2018-14598
- CVE-2018-14599
- CVE-2018-14600
- CVE-2018-14625
- CVE-2018-14647
- CVE-2018-14734
- CVE-2018-15473
- CVE-2018-15594
- CVE-2018-15686
- CVE-2018-15853
- CVE-2018-15854
- CVE-2018-15855
- CVE-2018-15856
- CVE-2018-15857
- CVE-2018-15859
- CVE-2018-15861
- CVE-2018-15862
- CVE-2018-15863
- CVE-2018-15864
- CVE-2018-16062
- CVE-2018-16402
- CVE-2018-16403
- CVE-2018-16658
- CVE-2018-16842
- CVE-2018-16866
- CVE-2018-16881
- CVE-2018-16885
- CVE-2018-16888
- CVE-2018-17100
- CVE-2018-17101
- CVE-2018-18074
- CVE-2018-18281
- CVE-2018-18310
- CVE-2018-18384
- CVE-2018-18520
- CVE-2018-18521
- CVE-2018-18557
- CVE-2018-18661
- CVE-2018-19044
- CVE-2018-1000169
- CVE-2018-1000876
- CVE-2018-1000877
- CVE-2018-1000878
- CVE-2019-0217
- CVE-2019-0220
- CVE-2019-1559
- CVE-2019-2503
- CVE-2019-2529
- CVE-2019-2614
- CVE-2019-2627
- CVE-2019-3459
- CVE-2019-3460
- CVE-2019-3840
- CVE-2019-3858
- CVE-2019-3861
- CVE-2019-3882
- CVE-2019-3900
- CVE-2019-5010
- CVE-2019-5489
- CVE-2019-7149
- CVE-2019-7150
- CVE-2019-7222
- CVE-2019-7664
- CVE-2019-7665
- CVE-2019-9740
- CVE-2019-9947
- CVE-2019-9948
- CVE-2019-11599
- CVE-2019-11810
- CVE-2019-11833
- CVE-2019-1000019
- CVE-2019-1000020
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.