Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:1231 - Security Advisory
Issued:
2018-04-29
Updated:
2018-04-29

RHSA-2018:1231 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: OpenShift Container Platform 3.7 security and bug fix update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat OpenShift Container Platform 3.7.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

This advisory contains RPM packages for this release. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2018:1230

Security Fix(es):

  • source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go (CVE-2018-1102)

This update also fixes the following bugs:

  • Fluentd inserts documents (logs) into Elasticsearch using the bulk insert API, but relies upon Elasticsearch to generate UUIDs for each document. It does not remove successfully indexed documents from the bulk payload when the bulk operation fails. This caused the initial payload to be resubmitted and documents that were successfully indexed to be submitted again, which results in duplicate documents with different UUIDs. This bug fix ensures that document IDs are generated before submitting bulk insert requests. As a result, Elasticsearch will disregard the insertion of documents that already exist in the data store and insert documents that do not. (BZ#1556896)
  • A user can set a host name to `localhost`, which confuses the router check to see if the reload completed. This caused the reload to never return success, causing the router to fail. This bug fix changes the health check so that it does not pass the host name `localhost`. As a result, routers can now reload successfully. (BZ#1548102)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenShift Container Platform 3.7 x86_64

Fixes

  • BZ - 1505684 - The kibana should use cluster_public_hostname when openshift_logging_master_public_url is not set
  • BZ - 1548102 - [3.7] A route with host 'localhost' can freeze router reloads under some circumstances
  • BZ - 1553707 - run.sh is missing in curator image
  • BZ - 1554865 - [3.7] subpath volume mounts do not work with secret, configmap, projected, or downwardAPI volumes
  • BZ - 1556782 - [3.7] Mounting file in a subpath fails if file was created in initContainer
  • BZ - 1556896 - Duplicate elasticsearch entries increase as namespaces increase (constant message rate)
  • BZ - 1557492 - Task "Wait for master to restart" will break upgrade/install if working through bastion
  • BZ - 1559225 - OpenShift installer upgrade playbook doesn't apply latest rpm packages when a git version change
  • BZ - 1559671 - [3.7] Fail to update EFK: 'namespace'
  • BZ - 1560430 - [CNS][3.7] Installation failed with glusterfs_heketi_route undefined error when enable openshift_storage_glusterfs_registry_block_storageclass with glusterfs_registry group
  • BZ - 1562246 - CVE-2018-1102 source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
  • BZ - 1562966 - Fresh OCP 3.7 on AWS install fails with "msg": "file not found: /etc/origin/logging/ca.crl.srl"

CVEs

  • CVE-2018-1102

References

  • https://access.redhat.com/security/updates/classification/#critical
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Container Platform 3.7

SRPM
apb-1.0.6-1.el7.src.rpm SHA-256: 9ca6153fc8f4f99b93387f317b99f490c3f25f0a7ef1438832d036996460f548
atomic-openshift-3.7.44-1.git.0.6b061d4.el7.src.rpm SHA-256: 7e217975b3a2b7d3bb4bb6fe5b52651c3e75f9bdc4cf0f34a5fad7b337f499f0
rubygem-fluent-plugin-elasticsearch-1.14.0-1.el7.src.rpm SHA-256: 653c77e2e90fafbd59d8fba21e0eb20b5bd12d8c170346db29d0f30eac6eb652
x86_64
apb-1.0.6-1.el7.noarch.rpm SHA-256: 05ee4e9d7a674b69fc53ed48f4b219df626df9508c508bb81f772b66c8ff02f1
apb-container-scripts-1.0.6-1.el7.noarch.rpm SHA-256: 019fda69643884efdcb28fa6501c41b25f69f4ab3c625c04e593ec11ca7c37a3
atomic-openshift-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 2d1efdb27a85affcaf4100c805bd16e5d4f3f44ae693f3eca831df3fb5e5fe34
atomic-openshift-clients-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 2aebc853c78d377248265c96dc685e28b014f29e9c7b53f872034a472f1ff643
atomic-openshift-clients-redistributable-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 4dba5fbe736326cd1767a930b585e38dd6f03bd5157f092c83d3ee3c3d3d4351
atomic-openshift-cluster-capacity-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 00033e7cf69b117621fc9993c7a09768f6fdefa27d3dc4e46d8fdc3f18ec9d0c
atomic-openshift-docker-excluder-3.7.44-1.git.0.6b061d4.el7.noarch.rpm SHA-256: a1c58798c87eff15e46f8e5e03fb6822d1578b3a2254c9b075470275780ecc95
atomic-openshift-dockerregistry-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 47b18cc5e53e60f934acd9c11e1324c3873be8611e4d434e5dcc90bec21bbf03
atomic-openshift-excluder-3.7.44-1.git.0.6b061d4.el7.noarch.rpm SHA-256: 014d4cf030688ecbb9d6311f8eb74aa3b4b7b2241c0efd2d74b3be4de00c7fc7
atomic-openshift-federation-services-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 52cd4a2343095c04351fa76159684747f2b55fce2f52b71dff2b94c21c97301e
atomic-openshift-master-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: a82905aff02f1a07beeee56c37c5c0aa28730f10acf58c609dba8f2a2a1cb48d
atomic-openshift-node-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: ab56d41d2340e06b72d4b5740232b1a0e23a8e02df1af2f87a353ff37c023103
atomic-openshift-pod-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: d8dedb67349d9e6ddd154806516aec118cff6e4c6ed355bd556107105ae5551b
atomic-openshift-sdn-ovs-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 5a1ec4bb497f9bc72bef3db00d7db1a5c64d1616c682eeed76eda6a8b069853a
atomic-openshift-service-catalog-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 1a94cf4a79ba9c39a1194f2867350c9736dc1b911f20007862ccca4a055c5504
atomic-openshift-template-service-broker-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 83e564c19f5be868191a32e09218e70010f914d39a16511e1ee12c87eef16c43
atomic-openshift-tests-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: 544f9d70052516977e2afc85d08fec9d7f4edf96896da0ae36e298ddd7af9d61
rubygem-fluent-plugin-elasticsearch-1.14.0-1.el7.noarch.rpm SHA-256: 86ba7fb3a09c71268395cde472c57b66e461847e21cf3025eb32c1048763b61a
rubygem-fluent-plugin-elasticsearch-doc-1.14.0-1.el7.noarch.rpm SHA-256: 8745d1bc7f92ae2e26387a839924e72d1bb07832cae7475f48e401b69194532d
tuned-profiles-atomic-openshift-node-3.7.44-1.git.0.6b061d4.el7.x86_64.rpm SHA-256: d9c7e62549276189b903e833671033db2c6eaa6303d6ae161321272ddfb53ae2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility