- Issued:
- 2020-05-13
- Updated:
- 2020-05-13
RHBA-2020:2023 - Bug Fix Advisory
Synopsis
OpenShift Container Platform 4.2.33 bug fix update
Type/Severity
Bug Fix Advisory
Topic
Red Hat OpenShift Container Platform release 4.2.33 is now available with
updates to packages and images that fix several bugs.
Description
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.2.33. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHBA-2020:2022
This update fixes the following bugs:
- The data in the journald for facility values was not sanitized. As a result, fluentd would emit error messages at the wrong level, causing confusion to users. Now, fluentd logs at the proper debug level. (BZ#1756072)
- The NodeCA daemon did not tolerate NoSchedule, and could not be deployed on tainted nodes. Now, NodeCA tolerates NoSchedule and the daemon can manage certificates on nodes with NoSchedule options. (BZ#1808433)
- The NodeCA daemon did not tolerate the NoExecute taint, and could not manage certificates properly on tainted nodes. Now, all taints are tolerated and are synced to all nodes with any taints. (BZ#1820243)
- The OpenStack IPI installer created Security groups using `remote_group_id` to allow traffic origins. Using `remote_group_id` in the security rules causes a lot of computation by the OVS agent to generate the flows and possibly exceeding the time allocated for flow generation. In such cases, especially in environments already under stress, masters nodes were unable to communicate with worker nodes, leading the deployment to fail. Now, IP prefixes are used for whitelisting traffic origins intsead of `remote_group_id`. (BZ#1827795)
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html
You may download the oc tool and use it to inspect release image metadata
as follows:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.2.33
The image digest is sha256:52e780ccc7e3af73b11dcb4afe275e2e743b59ccea6f228089ac93337de244d7
All OpenShift Container Platform 4.2 users are advised to upgrade to these
updated packages and images.
Solution
For OpenShift Container Platform 4.2 see the following documentation, which
will be updated shortly for release 4.2.33, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.2/updating/updating-cluster-cli.html.
Affected Products
- Red Hat OpenShift Container Platform 4.2 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.2 for RHEL 7 x86_64
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.2 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.2 for RHEL 7 s390x
Fixes
- BZ - 1718819 - v4.2/kube1.14 `oc edit` failed with error "415 Unsupported Media Type" for media types is "strategic-merge-patch+json"
- BZ - 1756072 - fluentd couldn't forward logs to rsyslog out:syslog: invalid facility value DEVICE
- BZ - 1768901 - Emit events when certs are rotated
- BZ - 1769992 - etcd: server certs should support client usage
- BZ - 1785219 - Machine config pool reports Degraded when audit is enabled
- BZ - 1795312 - oc: error: No Auth Provider found for name "gcp"
- BZ - 1803216 - Local persistent storage operator is unexpectedly removing storageclass annotations
- BZ - 1807294 - Wrong sort criteria for capacity on console
- BZ - 1808433 - [4.2.z] No global tolerations for NodeCA DaemonSet
- BZ - 1814012 - Metrics exposed over insecure channel
- BZ - 1816389 - [OCP][3.11][NetworkingPolicies] Pod to pod communication when using network policies
- BZ - 1820243 - [4.2] node-ca daemonset toleration conflicts with clusterlogging CR
- BZ - 1820543 - 4.2 UPI Vmware test runs fail with invalid internal LB hostname in certificates
- BZ - 1824234 - Placeholder bug for OCP 4.2.z rpm release
- BZ - 1824236 - Placeholder bug for OCP 4.2.z extras release
- BZ - 1824237 - Placeholder bug for OCP 4.2.z metadata release
- BZ - 1826181 - [DOCS][l10n] missed the nodeSelector configuration for openshift-state-metrics pods
- BZ - 1827795 - Using security rules with remote security group may cause deployment to fail
- BZ - 1829028 - 4.2.30 install on GCP fails consistently with machine-api-operator in CrashLoopBackoff
CVEs
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.