Lucene search

K
redhatRedHatRHSA-2018:2709
HistoryNov 11, 2018 - 4:28 p.m.

(RHSA-2018:2709) Important: Red Hat OpenShift Container Platform 3.10 security and bug fix update

2018-11-1116:28:30
access.redhat.com
527

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

65.6%

Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.10.66. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2018:2824

Security Fix(es):

  • atomic-openshift: oc patch with json causes masterapi service crash (CVE-2018-14632)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank Lars Haugan for reporting this issue.

All OpenShift Container Platform 3.10 users are advised to upgrade to these updated packages and images.

Bug Fix(es):

  • During etcd scaleup, facts about the etcd cluster are required to add new hosts. This bug fix adds the necessary tasks to ensure those facts get set before configuring new hosts, and therefore, allow the scaleup to complete as expected. (BZ#1578482)

  • Previously, sync pod was not available when the Prometheus install checked for available nodes. As a consequence, if a custom label was used for the Prometheus install to select an appropriate node, the sync pods must have already applied the label to the nodes. Otherwise, the Prometheus installer would not find any nodes with a matching label. This bug fix adds a check to the install process to wait for sync pods to become available before continuing. As a result, the node labeling process will complete, and the nodes will have the correct labels for the Prometheus pod to be scheduled. (BZ#1609019)

  • This bug fix corrects an issue where a pod is stuck terminating due to I/O errors on a FlexVolume mounted on the XFS file system. (BZ#1626054)

  • Previously, fluentd generated events internally with the OneEventStream class. This class does not have the empty? method. The Kubernetes metadata filter used the empty? method on the EventStream object to avoid processing an empty stream. Fluentd issued error messages about the missing empty? method, which overwhelmed container logging and caused disk issues. This bug fix changed the Kubernetes metadata filter only to call the empty? method on objects that have this method. As a result,
    fluentd logs do not contain this message. (BZ#1626552)

  • RubyGems FFI 1.9.25 reverted a patch which allowed it to work on systems with SELinux deny_execmem=1. This reversion caused fluentd to crash. This bug reverts the patch reversion. As a result, fluentd does not crash when using SELinux deny_execmem=1. (BZ#1628405)

  • This bug fix updates the redeploy-openshift-ca.yml playbook to reference the correct node client certificate file, node/client-ca.crt. (BZ#1628546)

  • The fix for BZ1628371 introduced a poorly built shared library with a missing symbol. This missing symbol caused fluentd to crash with an “undefined symbol: rbffi_Closure_Alloc” error message. This bug fix rebuilds the shared library with the correct symbols. As a result, fluentd does not crash. (BZ#1628798)

  • Previously, when using Docker with the journald log driver, all container logs, including system and plain Docker container logs, were logged to the journal, and read by fluentd. Fluentd did not know how to handle these non-Kubernetes container logs and threw exceptions. This bug fix treats non-Kubernetes container logs as logs from other system services, for example, sending them to the .operations.* index. As a result, logs from
    non-Kubernetes containers are indexed correctly and do not cause any errors. (BZ#1632361)

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

65.6%