Updated packages are now available for Red Hat OpenShift Enterprise release 2.2.These packages are required to avoid dependency issues with the Red HatEnterprise Linux 6.8 base channel.

OpenShift Enterprise by Red Hat is the company’s cloud computingPlatform-as-a-Service (PaaS) solution designed for on-premise or private clouddeployments.This update fixes the following bug:* The ImageMagick, icu, yum-utils, and php packages in OpenShift Enterprise 2.2must be updated to avoid package dependency issues with Red Hat Enterprise Linux6.8.

This fix introduces the required package updates to Red Hat OpenShiftEnterprise 2.2 channels so that users do not experience dependency issues.(BZ#1336485, BZ#1336480)All OpenShift Enterprise 2 users are advised to upgrade to these updatedpackages.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network.

Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258.Red Hat OpenShift Enterprise 2

SRPMS:
ImageMagick-6.7.2.7-4.el6_7.src.rpm
    MD5: 67a523c7118522445514edeb51d1787aSHA-256: 7a940961a827f1764c7afcad1d9ab906d9f3424ba6fe4866e4e7099fb7c9b951
icu-4.2.1-14.el6.src.rpm
    MD5: 6ef117a7b3cc24c833e8ec700f8e451eSHA-256: 2906dbde4680827b53dd93c526552c5b5a9d49e18e948796df1517d216259f69
php-5.3.3-47.el6.src.rpm
    MD5: 2d3c906f59f9946bd1971ed63cf7515aSHA-256: e274a4e83521255de4fafa0964bc66d97f9b4a9108a422586d6c37bf5dd34a19
rsyslog7-7.4.10-5.el6op.src.rpm
    MD5: 500600116e01002971a71328529c0115SHA-256: ad93ff9dd9a4cceb5e87b7fba2ada67269c38bd5bf2706ca42257db7ea4f9009
yum-utils-1.1.30-37.el6.src.rpm
    MD5: 3bc3ddff899cfaa8aea756a1d9c9657eSHA-256: b099fc6bf6e30cff5b6909bd0b6311816b0d9c4791f71368361b92a0296e77a6
 
x86_64:
ImageMagick-devel-6.7.2.7-4.el6_7.x86_64.rpm
    MD5: 9cd7f8e9f7414c1b3c02024f9fd6c5d1SHA-256: ded5c44fd3bfe4f1e86905cfe971801a624ae4041b44de0db38a4c7fba16d934
ImageMagick-doc-6.7.2.7-4.el6_7.x86_64.rpm
    MD5: c787187995e766df64bfbefeb1faa924SHA-256: 5c5c9e9c1f9b26241fefc0f4d9d8420e5b69487413c059e6c1c2ca54d6458bd7
ImageMagick-perl-6.7.2.7-4.el6_7.x86_64.rpm
    MD5: 4cc75c74a9ff46b53c75d138ccabe186SHA-256: be032f90c3ccfd34c5bcd723f9533d85adac4ade366b970aee17a6923278b611
libicu-devel-4.2.1-14.el6.x86_64.rpm
    MD5: de6ac2da958bd2cfdf10e9c8b24e7199SHA-256: ee234bbde5a59ccf910cd759a80b2d198fbcad6d96c82c06447266b39cd7cca9
php-bcmath-5.3.3-47.el6.x86_64.rpm
    MD5: 32aae2ece44663f09c668666096e0631SHA-256: a907e999b24247fd4e2245c405918f0069a907c9227f2a56c3de7963ce098afc
php-devel-5.3.3-47.el6.x86_64.rpm
    MD5: 204ec8b30ed1224cc87b424d396fadbaSHA-256: 4ea9fd0f26cba6e7af415ae7f72ddbdde6d05d875a11e2d87bd532d41bfbc7e5
php-fpm-5.3.3-47.el6.x86_64.rpm
    MD5: b75b446b1333cc42a29a21a6cdf5d56dSHA-256: bf55c1f355ffc728c14d2fa029e460c19d37157b402832c29c10cd7e6cd06eee
php-imap-5.3.3-47.el6.x86_64.rpm
    MD5: ddee4c0d256bfe05ca0851b02eb6b08bSHA-256: 1d3bc1e3ff2de5e2e449cd043b3ea94e56fd6569263ada101457c77df3c28bd4
php-intl-5.3.3-47.el6.x86_64.rpm
    MD5: afb4f34e41ba1eb1fb00cf58f6350904SHA-256: c7289f269e777a0e1cfb892d9dde9fa6b74a77949c5e5e25f742d77e41aa782b
php-mbstring-5.3.3-47.el6.x86_64.rpm
    MD5: f4639f8ceb91d3063308ac25d03bff24SHA-256: 4f0ad330abbe39e47bb89c4bf8fad2337b4d867caea8f7c13bafdf52aca449ce
php-process-5.3.3-47.el6.x86_64.rpm
    MD5: f2e0c887d2d72f010efdd26a3260c60eSHA-256: 3e56c354257101a2c7ef5460a9955a6d7ecbe2fd19c4f9528772247c03e74f30
rsyslog7-mmopenshift-7.4.10-5.el6op.x86_64.rpm
    MD5: a37ad74c8eaeb41c3a71333738da6818SHA-256: 4053ea9413d2c0559b01b64c2605c8dd2129065a3e6951e0e4e8d133237b1fbd
yum-plugin-priorities-1.1.30-37.el6.noarch.rpm
    MD5: 8341c0db475dd5b4fdd7b47176e84936SHA-256: cbd38b3b9c03f00df06acfef95e30473b1a84df096ff4d95f9916e7059170328
 
(The unlinked packages above are only available from the Red Hat Network)
1336480 – cant install Image Magick due to OSE dependencies1336485 – [RHEL68] php Dependency error was report

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: