RHEL 7 : OpenShift Container Platform 3.9 (RHSA-2018:2013)

critical Nessus Plugin ID 119401

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2018:2013 advisory.

Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 3.9.31. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2018:2014

Security Fix(es):

* routing: Malicious Service configuration can bring down routing for an entire shard (CVE-2018-1070)

* openshift-ansible: Incorrectly quoted values in etcd.conf causes disabling of SSL client certificate authentication (CVE-2018-1085)

* source-to-image: Builder images with assembler-user LABEL set to root allows attackers to execute arbitrary code (CVE-2018-10843)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank David Hocky (Comcast) for reporting CVE-2018-1085. The CVE-2018-1070 issue was discovered by Mark Chappell (Red Hat) and the CVE-2018-10843 issue was discovered by Jeremy Choi (Red Hat).

Space precludes documenting all of the bug fixes and enhancements in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html

All OpenShift Container Platform 3.9 users are advised to upgrade to these updated packages and images.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1534311

https://bugzilla.redhat.com/show_bug.cgi?id=1534894

https://bugzilla.redhat.com/show_bug.cgi?id=1537872

https://bugzilla.redhat.com/show_bug.cgi?id=1538215

https://bugzilla.redhat.com/show_bug.cgi?id=1539252

https://bugzilla.redhat.com/show_bug.cgi?id=1539310

https://bugzilla.redhat.com/show_bug.cgi?id=1541350

https://bugzilla.redhat.com/show_bug.cgi?id=1542387

https://bugzilla.redhat.com/show_bug.cgi?id=1542460

https://bugzilla.redhat.com/show_bug.cgi?id=1546097

https://bugzilla.redhat.com/show_bug.cgi?id=1546324

https://bugzilla.redhat.com/show_bug.cgi?id=1546936

https://bugzilla.redhat.com/show_bug.cgi?id=1548677

https://bugzilla.redhat.com/show_bug.cgi?id=1549060

https://bugzilla.redhat.com/show_bug.cgi?id=1549454

https://bugzilla.redhat.com/show_bug.cgi?id=1550193

https://bugzilla.redhat.com/show_bug.cgi?id=1550316

https://bugzilla.redhat.com/show_bug.cgi?id=1550385

https://bugzilla.redhat.com/show_bug.cgi?id=1550591

https://bugzilla.redhat.com/show_bug.cgi?id=1553012

https://bugzilla.redhat.com/show_bug.cgi?id=1553035

https://bugzilla.redhat.com/show_bug.cgi?id=1553294

https://bugzilla.redhat.com/show_bug.cgi?id=1554141

https://bugzilla.redhat.com/show_bug.cgi?id=1554145

https://bugzilla.redhat.com/show_bug.cgi?id=1554239

https://bugzilla.redhat.com/show_bug.cgi?id=1557040

https://bugzilla.redhat.com/show_bug.cgi?id=1557822

https://bugzilla.redhat.com/show_bug.cgi?id=1558183

http://www.nessus.org/u?990ae81e

http://www.nessus.org/u?b353fb8c

https://access.redhat.com/errata/RHSA-2018:2013

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1466390

https://bugzilla.redhat.com/show_bug.cgi?id=1498398

https://bugzilla.redhat.com/show_bug.cgi?id=1506175

https://bugzilla.redhat.com/show_bug.cgi?id=1507429

https://bugzilla.redhat.com/show_bug.cgi?id=1512042

https://bugzilla.redhat.com/show_bug.cgi?id=1525642

https://bugzilla.redhat.com/show_bug.cgi?id=1529575

https://bugzilla.redhat.com/show_bug.cgi?id=1531096

https://bugzilla.redhat.com/show_bug.cgi?id=1539529

https://bugzilla.redhat.com/show_bug.cgi?id=1539757

https://bugzilla.redhat.com/show_bug.cgi?id=1540819

https://bugzilla.redhat.com/show_bug.cgi?id=1541212

https://bugzilla.redhat.com/show_bug.cgi?id=1558997

https://bugzilla.redhat.com/show_bug.cgi?id=1560311

https://bugzilla.redhat.com/show_bug.cgi?id=1563150

https://bugzilla.redhat.com/show_bug.cgi?id=1563673

https://bugzilla.redhat.com/show_bug.cgi?id=1566238

https://bugzilla.redhat.com/show_bug.cgi?id=1568815

https://bugzilla.redhat.com/show_bug.cgi?id=1569030

https://bugzilla.redhat.com/show_bug.cgi?id=1570065

https://bugzilla.redhat.com/show_bug.cgi?id=1570581

https://bugzilla.redhat.com/show_bug.cgi?id=1571601

https://bugzilla.redhat.com/show_bug.cgi?id=1571944

https://bugzilla.redhat.com/show_bug.cgi?id=1572786

https://bugzilla.redhat.com/show_bug.cgi?id=1579096

https://bugzilla.redhat.com/show_bug.cgi?id=1580538

https://bugzilla.redhat.com/show_bug.cgi?id=1583895

https://bugzilla.redhat.com/show_bug.cgi?id=1585243

https://bugzilla.redhat.com/show_bug.cgi?id=1586076

https://bugzilla.redhat.com/show_bug.cgi?id=1588009

https://bugzilla.redhat.com/show_bug.cgi?id=1588768

Plugin Details

Severity: Critical

ID: 119401

File Name: redhat-RHSA-2018-2013.nasl

Version: 1.7

Type: local

Agent: unix

Published: 12/4/2018

Updated: 11/5/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-1085

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:atomic-openshift-federation-services, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-cluster-capacity, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-roles, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-docs, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-web-console, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-playbooks, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-utils, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-service-catalog, p-cpe:/a:redhat:enterprise_linux:openshift-ansible, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-excluder, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-template-service-broker, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node-problem-detector, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-docker-excluder, p-cpe:/a:redhat:enterprise_linux:prometheus-node-exporter, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:mysql-apb-role, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:golang-github-prometheus-node_exporter, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-descheduler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 6/27/2018

Vulnerability Publication Date: 6/12/2018

Reference Information

CVE: CVE-2018-1070, CVE-2018-10843, CVE-2018-1085

CWE: 20, 287

RHSA: 2018:2013