Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:1229 - Security Advisory
Issued:
2018-04-28
Updated:
2018-04-28

RHSA-2018:1229 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: OpenShift Container Platform 3.8 security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat OpenShift Container Platform 3.8.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

This advisory contains RPM packages for this release. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2018:1228

Security Fix(es):

  • source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go (CVE-2018-1102)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenShift Container Platform 3.8 x86_64

Fixes

  • BZ - 1562246 - CVE-2018-1102 source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go

CVEs

  • CVE-2018-1102

References

  • https://access.redhat.com/security/updates/classification/#critical
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Container Platform 3.8

SRPM
atomic-openshift-3.8.37-1.git.0.e85a326.el7.src.rpm SHA-256: 86673e44628c8d33c853a6a03ec0c52b40fcf11b5e9ad3b75616d82711653e67
atomic-openshift-dockerregistry-3.8.37-1.git.224.8e15ecf.el7.src.rpm SHA-256: 93d70d3324a36dc6a2d6f376e84bf48a4815fea8593dca1ec680882f3aae1aa2
openshift-ansible-3.8.37-1.git.0.be319af.el7.src.rpm SHA-256: 849963248e071e833d763a9892056fbd3c1d09dc13626b49a33b3d69f2ca2c70
x86_64
atomic-openshift-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: 3a72b5d4912dda1bdd0c7cb39961b2390d89ce113ab282c3b470078797a9ccbd
atomic-openshift-clients-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: a060570d269f52751292fc72965e88e21ecd85d81e67da8c7fb9c9486c231576
atomic-openshift-clients-redistributable-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: c445a7a340708ebe8f6ce474af3625a2bde9c93fe730d4c15f6c0b6058df5e81
atomic-openshift-cluster-capacity-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: 56513773cd343b34bec7d0838902e3ad713b43a0c3e907e900e00e7b2e713993
atomic-openshift-docker-excluder-3.8.37-1.git.0.e85a326.el7.noarch.rpm SHA-256: b5eee0118e8159ebeea0f47fe3c28b09e917769571b7aced21070cb6c4efcd58
atomic-openshift-dockerregistry-3.8.37-1.git.224.8e15ecf.el7.x86_64.rpm SHA-256: f48fede367a88bb74cbc7fbed51e8babb716cf5bd55b2e475496a3773112a3dc
atomic-openshift-excluder-3.8.37-1.git.0.e85a326.el7.noarch.rpm SHA-256: 7976e16da994b5c4244beb55f56e234f5af4f3fd81d15ee7446103d54bf8fd44
atomic-openshift-federation-services-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: 0cd35ed5ada01d7d08057d74f0b859ccaf402bf343e35e74c27cf64b100fba53
atomic-openshift-master-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: 475e5ba5ce1e2dc1a3c52c2b35af6204e50b545cc73376897072b08d22e2b985
atomic-openshift-node-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: fb7c6520e11bbe9d206db9a032cd76bb1e367cdf0701dc9db47e2cb7c9c5a632
atomic-openshift-pod-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: b7dd8c31d06f7307554c8282d27371fbfd5ae3b33a1d30c0adab1fbb8fe7ee87
atomic-openshift-sdn-ovs-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: a9e058bf4b52fe4a1b354c8f55078001d292c2e0edbc592298a82caf26adf633
atomic-openshift-service-catalog-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: b304921c18664ba6188285b3a4403bbaa3bb08a3073ab8b5e3e93d8d1c541b53
atomic-openshift-template-service-broker-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: 6c2c2575ee363fd54a245d4b2c66784688134cb80d9b8e09c9bd5767c4d6ccf2
atomic-openshift-tests-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: df24b4ba35697d054915589c9a7564013122d16fb0b27d46a9c60b67c69c8870
atomic-openshift-utils-3.8.37-1.git.0.be319af.el7.noarch.rpm SHA-256: d00db85dbc25f6bae58385155b162bab63dcddf45ec902da2d37f22c4829a609
openshift-ansible-3.8.37-1.git.0.be319af.el7.noarch.rpm SHA-256: f24633efe714dd6b55b5aea5d9feb6105221813ca9ddc5fc592ae800d7991e25
openshift-ansible-docs-3.8.37-1.git.0.be319af.el7.noarch.rpm SHA-256: 7b6fc2a13fc0d0398518dab1689125759497bf555864d6055790a2f80c727394
openshift-ansible-playbooks-3.8.37-1.git.0.be319af.el7.noarch.rpm SHA-256: abf4f788e187003c9a045a2ec76bb45eef4e3a5c222f5f7883283d6e575c586c
openshift-ansible-roles-3.8.37-1.git.0.be319af.el7.noarch.rpm SHA-256: 04b79936bdb91343d1a8f6bd0e59d3dead4fc237b53259979c29735a5b13594a
tuned-profiles-atomic-openshift-node-3.8.37-1.git.0.e85a326.el7.x86_64.rpm SHA-256: e51e74d16c1994465db8fe1460c46555719cc4cb736cdf08a051774bfa5cc83d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility