RHEL 6 : Red Hat OpenShift Enterprise 2.2.8 (RHSA-2015:2666)

high Nessus Plugin ID 119366

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2015:2666 advisory.

OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

The following security issue is addressed with this release:

An implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could use this flaw to leak certain memory buffer contents from a past request or session. (CVE-2015-3281)

Space precludes documenting all of the bug fixes in this advisory. See the OpenShift Enterprise Technical Notes, which will be updated shortly for release 2.2.8, for details about these changes:

https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html- single/Technical_Notes/index.html

All OpenShift Enterprise 2 users are advised to upgrade to these updated packages.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?36b2fcc7

https://access.redhat.com/errata/RHSA-2015:2666

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1045226

https://bugzilla.redhat.com/show_bug.cgi?id=1054441

https://bugzilla.redhat.com/show_bug.cgi?id=1064039

https://bugzilla.redhat.com/show_bug.cgi?id=1101973

https://bugzilla.redhat.com/show_bug.cgi?id=1110415

https://bugzilla.redhat.com/show_bug.cgi?id=1111501

https://bugzilla.redhat.com/show_bug.cgi?id=1111598

https://bugzilla.redhat.com/show_bug.cgi?id=1139608

https://bugzilla.redhat.com/show_bug.cgi?id=1140766

https://bugzilla.redhat.com/show_bug.cgi?id=1155003

https://bugzilla.redhat.com/show_bug.cgi?id=1177753

https://bugzilla.redhat.com/show_bug.cgi?id=1211526

https://bugzilla.redhat.com/show_bug.cgi?id=1218872

https://bugzilla.redhat.com/show_bug.cgi?id=1238305

https://bugzilla.redhat.com/show_bug.cgi?id=1239072

https://bugzilla.redhat.com/show_bug.cgi?id=1241675

https://bugzilla.redhat.com/show_bug.cgi?id=1248439

https://bugzilla.redhat.com/show_bug.cgi?id=1255426

https://bugzilla.redhat.com/show_bug.cgi?id=1264722

https://bugzilla.redhat.com/show_bug.cgi?id=1265609

https://bugzilla.redhat.com/show_bug.cgi?id=1268080

https://bugzilla.redhat.com/show_bug.cgi?id=1270660

https://bugzilla.redhat.com/show_bug.cgi?id=1271338

https://bugzilla.redhat.com/show_bug.cgi?id=1272195

https://bugzilla.redhat.com/show_bug.cgi?id=1277695

https://bugzilla.redhat.com/show_bug.cgi?id=1280438

https://bugzilla.redhat.com/show_bug.cgi?id=1282520

https://bugzilla.redhat.com/show_bug.cgi?id=1282940

Plugin Details

Severity: High

ID: 119366

File Name: redhat-RHSA-2015-2666.nasl

Version: 1.7

Type: local

Agent: unix

Published: 12/4/2018

Updated: 6/3/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2015-3281

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-yum-validator, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade-broker, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbosseap, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-common, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-node, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-python, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-routing-daemon, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-release, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-haproxy, p-cpe:/a:redhat:enterprise_linux:rhc, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade-node, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-controller, p-cpe:/a:redhat:enterprise_linux:haproxy15side, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbossews

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/17/2015

Vulnerability Publication Date: 7/6/2015

Reference Information

CVE: CVE-2015-3281

CWE: 119

RHSA: 2015:2666