RHEL 7 : Red Hat OpenShift Enterprise 3.2 (RHSA-2016:1064)

high Nessus Plugin ID 119372

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2016:1064 advisory.

OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

Security Fix(es):

* A flaw was found in the building of containers within OpenShift Enterprise. An attacker could submit an image for building that executes commands within the container as root, allowing them to potentially escalate privileges. (CVE-2016-2160)

* It was found that OpenShift Enterprise would disclose log file contents from reclaimed namespaces. An attacker could create a new namespace to access log files present in a previously deleted namespace using the same name. (CVE-2016-2149)

* An information disclosure flaw was discovered in haproxy as used by OpenShift Enterprise; a cookie with the name OPENSHIFT_[namespace]_SERVERID was set, which contained the internal IP address of a pod.
(CVE-2016-3711)

The CVE-2016-2149 issue was discovered by Wesley Hearn (Red Hat).

Additional Changes:

* Space precludes documenting all of the bug fixes and enhancements in this advisory. For details on all new features, bug fixes, and known issues, see the OpenShift Enterprise 3.2 Release Notes linked to in the References section.

This update includes the following images:

openshift3/ose:v3.2.0.20-3 openshift3/ose-deployer:v3.2.0.20-3 openshift3/ose-docker-builder:v3.2.0.20-3 openshift3/ose-docker-registry:v3.2.0.20-3 openshift3/ose-f5-router:v3.2.0.20-3 openshift3/ose-haproxy-router:v3.2.0.20-3 openshift3/ose-keepalived-ipfailover:v3.2.0.20-3 openshift3/ose-pod:v3.2.0.20-3 openshift3/ose-recycler:v3.2.0.20-3 openshift3/ose-sti-builder:v3.2.0.20-3 openshift3/image-inspector:1.0.0-12 openshift3/jenkins-1-rhel7:1.642-31 openshift3/logging-auth-proxy:3.2.0-3 openshift3/logging-deployment:3.2.0-8 openshift3/logging-elasticsearch:3.2.0-7 openshift3/logging-fluentd:3.2.0-6 openshift3/logging-kibana:3.2.0-3 openshift3/metrics-cassandra:3.2.0-4 openshift3/metrics-deployer:3.2.0-5 openshift3/metrics-hawkular-metrics:3.2.0-6 openshift3/metrics-heapster:3.2.0-5 openshift3/mongodb-24-rhel7:2.4-27 openshift3/mysql-55-rhel7:5.5-25 openshift3/nodejs-010-rhel7:0.10-34 openshift3/node:v3.2.0.20-3 openshift3/openvswitch:v3.2.0.20-4 openshift3/perl-516-rhel7:5.16-37 openshift3/php-55-rhel7:5.5-34 openshift3/postgresql-92-rhel7:9.2-24 openshift3/python-33-rhel7:3.3-34 openshift3/ruby-20-rhel7:2.0-34

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?0e189937

http://www.nessus.org/u?81860f44

https://access.redhat.com/errata/RHSA-2016:1064

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1252520

https://bugzilla.redhat.com/show_bug.cgi?id=1264500

https://bugzilla.redhat.com/show_bug.cgi?id=1273149

https://bugzilla.redhat.com/show_bug.cgi?id=1276038

https://bugzilla.redhat.com/show_bug.cgi?id=1278719

https://bugzilla.redhat.com/show_bug.cgi?id=1278974

https://bugzilla.redhat.com/show_bug.cgi?id=1279344

https://bugzilla.redhat.com/show_bug.cgi?id=1282733

https://bugzilla.redhat.com/show_bug.cgi?id=1284700

https://bugzilla.redhat.com/show_bug.cgi?id=1285763

https://bugzilla.redhat.com/show_bug.cgi?id=1291958

https://bugzilla.redhat.com/show_bug.cgi?id=1293805

https://bugzilla.redhat.com/show_bug.cgi?id=1293830

https://bugzilla.redhat.com/show_bug.cgi?id=1293850

https://bugzilla.redhat.com/show_bug.cgi?id=1296232

https://bugzilla.redhat.com/show_bug.cgi?id=1297521

https://bugzilla.redhat.com/show_bug.cgi?id=1298942

https://bugzilla.redhat.com/show_bug.cgi?id=1299466

https://bugzilla.redhat.com/show_bug.cgi?id=1299756

https://bugzilla.redhat.com/show_bug.cgi?id=1300214

https://bugzilla.redhat.com/show_bug.cgi?id=1300298

https://bugzilla.redhat.com/show_bug.cgi?id=1300570

https://bugzilla.redhat.com/show_bug.cgi?id=1301425

https://bugzilla.redhat.com/show_bug.cgi?id=1302512

https://bugzilla.redhat.com/show_bug.cgi?id=1302894

https://bugzilla.redhat.com/show_bug.cgi?id=1303085

https://bugzilla.redhat.com/show_bug.cgi?id=1303171

https://bugzilla.redhat.com/show_bug.cgi?id=1304526

https://bugzilla.redhat.com/show_bug.cgi?id=1304582

https://bugzilla.redhat.com/show_bug.cgi?id=1304975

https://bugzilla.redhat.com/show_bug.cgi?id=1305165

https://bugzilla.redhat.com/show_bug.cgi?id=1305417

https://bugzilla.redhat.com/show_bug.cgi?id=1305765

https://bugzilla.redhat.com/show_bug.cgi?id=1306011

https://bugzilla.redhat.com/show_bug.cgi?id=1306590

https://bugzilla.redhat.com/show_bug.cgi?id=1306805

https://bugzilla.redhat.com/show_bug.cgi?id=1307013

https://bugzilla.redhat.com/show_bug.cgi?id=1307170

https://bugzilla.redhat.com/show_bug.cgi?id=1308312

https://bugzilla.redhat.com/show_bug.cgi?id=1308540

https://bugzilla.redhat.com/show_bug.cgi?id=1309192

https://bugzilla.redhat.com/show_bug.cgi?id=1309205

https://bugzilla.redhat.com/show_bug.cgi?id=1309435

https://bugzilla.redhat.com/show_bug.cgi?id=1310001

https://bugzilla.redhat.com/show_bug.cgi?id=1310062

https://bugzilla.redhat.com/show_bug.cgi?id=1310498

https://bugzilla.redhat.com/show_bug.cgi?id=1310567

https://bugzilla.redhat.com/show_bug.cgi?id=1310572

https://bugzilla.redhat.com/show_bug.cgi?id=1310587

https://bugzilla.redhat.com/show_bug.cgi?id=1310606

https://bugzilla.redhat.com/show_bug.cgi?id=1310616

https://bugzilla.redhat.com/show_bug.cgi?id=1310959

https://bugzilla.redhat.com/show_bug.cgi?id=1311024

https://bugzilla.redhat.com/show_bug.cgi?id=1311048

https://bugzilla.redhat.com/show_bug.cgi?id=1311049

https://bugzilla.redhat.com/show_bug.cgi?id=1311312

https://bugzilla.redhat.com/show_bug.cgi?id=1311396

https://bugzilla.redhat.com/show_bug.cgi?id=1312819

https://bugzilla.redhat.com/show_bug.cgi?id=1312826

https://bugzilla.redhat.com/show_bug.cgi?id=1313158

https://bugzilla.redhat.com/show_bug.cgi?id=1313210

https://bugzilla.redhat.com/show_bug.cgi?id=1313391

https://bugzilla.redhat.com/show_bug.cgi?id=1313779

https://bugzilla.redhat.com/show_bug.cgi?id=1314142

https://bugzilla.redhat.com/show_bug.cgi?id=1314270

https://bugzilla.redhat.com/show_bug.cgi?id=1314645

https://bugzilla.redhat.com/show_bug.cgi?id=1315157

https://bugzilla.redhat.com/show_bug.cgi?id=1315190

https://bugzilla.redhat.com/show_bug.cgi?id=1315563

https://bugzilla.redhat.com/show_bug.cgi?id=1315564

https://bugzilla.redhat.com/show_bug.cgi?id=1315595

https://bugzilla.redhat.com/show_bug.cgi?id=1315607

https://bugzilla.redhat.com/show_bug.cgi?id=1315637

https://bugzilla.redhat.com/show_bug.cgi?id=1316050

https://bugzilla.redhat.com/show_bug.cgi?id=1316127

https://bugzilla.redhat.com/show_bug.cgi?id=1316216

https://bugzilla.redhat.com/show_bug.cgi?id=1316233

https://bugzilla.redhat.com/show_bug.cgi?id=1316267

https://bugzilla.redhat.com/show_bug.cgi?id=1316698

https://bugzilla.redhat.com/show_bug.cgi?id=1316761

https://bugzilla.redhat.com/show_bug.cgi?id=1317097

https://bugzilla.redhat.com/show_bug.cgi?id=1317577

https://bugzilla.redhat.com/show_bug.cgi?id=1317835

https://bugzilla.redhat.com/show_bug.cgi?id=1317851

https://bugzilla.redhat.com/show_bug.cgi?id=1318395

https://bugzilla.redhat.com/show_bug.cgi?id=1318681

https://bugzilla.redhat.com/show_bug.cgi?id=1318726

https://bugzilla.redhat.com/show_bug.cgi?id=1318975

https://bugzilla.redhat.com/show_bug.cgi?id=1319439

https://bugzilla.redhat.com/show_bug.cgi?id=1320053

https://bugzilla.redhat.com/show_bug.cgi?id=1320335

https://bugzilla.redhat.com/show_bug.cgi?id=1320430

https://bugzilla.redhat.com/show_bug.cgi?id=1320719

https://bugzilla.redhat.com/show_bug.cgi?id=1320752

https://bugzilla.redhat.com/show_bug.cgi?id=1320939

https://bugzilla.redhat.com/show_bug.cgi?id=1320951

https://bugzilla.redhat.com/show_bug.cgi?id=1321258

https://bugzilla.redhat.com/show_bug.cgi?id=1321289

https://bugzilla.redhat.com/show_bug.cgi?id=1321308

https://bugzilla.redhat.com/show_bug.cgi?id=1321309

https://bugzilla.redhat.com/show_bug.cgi?id=1321569

https://bugzilla.redhat.com/show_bug.cgi?id=1322077

https://bugzilla.redhat.com/show_bug.cgi?id=1322314

https://bugzilla.redhat.com/show_bug.cgi?id=1322335

https://bugzilla.redhat.com/show_bug.cgi?id=1322338

https://bugzilla.redhat.com/show_bug.cgi?id=1322538

https://bugzilla.redhat.com/show_bug.cgi?id=1322718

https://bugzilla.redhat.com/show_bug.cgi?id=1322788

https://bugzilla.redhat.com/show_bug.cgi?id=1322942

https://bugzilla.redhat.com/show_bug.cgi?id=1323123

https://bugzilla.redhat.com/show_bug.cgi?id=1323633

https://bugzilla.redhat.com/show_bug.cgi?id=1324273

https://bugzilla.redhat.com/show_bug.cgi?id=1324357

https://bugzilla.redhat.com/show_bug.cgi?id=1324418

https://bugzilla.redhat.com/show_bug.cgi?id=1326214

https://bugzilla.redhat.com/show_bug.cgi?id=1326319

https://bugzilla.redhat.com/show_bug.cgi?id=1326446

https://bugzilla.redhat.com/show_bug.cgi?id=1327126

https://bugzilla.redhat.com/show_bug.cgi?id=1328067

https://bugzilla.redhat.com/show_bug.cgi?id=1328822

https://bugzilla.redhat.com/show_bug.cgi?id=1329370

https://bugzilla.redhat.com/show_bug.cgi?id=1330050

https://bugzilla.redhat.com/show_bug.cgi?id=1331038

Plugin Details

Severity: High

ID: 119372

File Name: redhat-RHSA-2016-1064.nasl

Version: 1.8

Type: local

Agent: unix

Published: 12/4/2018

Updated: 11/4/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2016-2160

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, p-cpe:/a:redhat:enterprise_linux:nodejs-proxy-addr, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-recycle, p-cpe:/a:redhat:enterprise_linux:tuned-profiles-atomic-openshift-node, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:nodejs-openshift-auth-proxy, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/12/2016

Vulnerability Publication Date: 6/8/2016

Reference Information

CVE: CVE-2016-2149, CVE-2016-2160, CVE-2016-3711

CWE: 200, 285

RHSA: 2016:1064