Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:1906 - Security Advisory
Issued:
2014-11-25
Updated:
2014-11-25

RHSA-2014:1906 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat OpenShift Enterprise 2.1.9 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Enterprise release 2.1.9, which fixes two security
issues, several bugs, and add one enhancement, is now available.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or private
cloud deployments.

It was found that OpenShift Enterprise 2.1 did not properly restrict access
to services running on different gears. This could allow an attacker to
access unprotected network resources running in another user's gear.

In a previous update, OpenShift Enterprise 2.2 introduced the
oo-gear-firewall command, which creates firewall rules and SELinux policy
to contain services running on gears to their own internal gear IPs.
The command is invoked by default during new installations of OpenShift
Enterprise 2.2 to prevent this security issue. This update backports the
command to OpenShift Enterprise 2.1.; administrators should run the
following command on node hosts in existing OpenShift Enterprise 2.1
deployments after applying this update to address this security issue:

# oo-gear-firewall -i enable -s enable

Please see the man page of the oo-gear-firewall command for more details.
(CVE-2014-3674)

It was found that OpenShift Enterprise did not restrict access to the
/proc/net/tcp file in gears, which allowed local users to view all
listening connections and connected sockets. This could result in remote
system's IP or port numbers in use to be exposed, which may be useful for
further targeted attacks.

Note that for local listeners, OpenShift Enterprise restricts connections
to within the gear by default, so even with the knowledge of the local port
and IP, the attacker is unable to connect. The SELinux policy on node hosts
has been updated to prevent this gear information from being accessed by
local users.

Due to the closing of this access, JBoss-based cartridges that relied on it
previously must be upgraded according to the standard procedure. This is a
compatible cartridge upgrade and therefore does not require a restart.
(CVE-2014-3602)

Space precludes documenting all of the bug fixes and enhancements in this
advisory. See the OpenShift Enterprise Technical Notes linked to in the
References section, which will be updated shortly for release 2.1.9, for
details about these changes.

All OpenShift Enterprise users are advised to upgrade to these updated
packages.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

See the OpenShift Enterprise 2.1 Release Notes linked to in the References
section, which will be updated shortly for release 2.1.9, for important
instructions on how to fully apply this asynchronous errata update.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258.

Affected Products

  • Red Hat OpenShift Enterprise Infrastructure 2.1 x86_64
  • Red Hat OpenShift Enterprise Application Node 2.1 x86_64
  • Red Hat OpenShift Enterprise JBoss EAP add-on 2.1 x86_64

Fixes

  • BZ - 1131680 - CVE-2014-3602 OpenShift: /proc/net/tcp information disclosure
  • BZ - 1143991 - [2.1 backport] Expose haproxy-sni-proxy mapped ports as environmental variables
  • BZ - 1148170 - CVE-2014-3674 OpenShift Enterprise: gears fail to properly isolate network traffic
  • BZ - 1149837 - [2.1 backport] oo-accept-systems: improve cartridge integrity checks
  • BZ - 1153319 - [2.1 backport] Disable SSLv3 to mitigate POODLE CVE- 2014- 3566
  • BZ - 1155794 - [2.1 backport] Race condition in `oo-httpd-singular graceful` when using apache-vhost
  • BZ - 1163502 - Remove explicit dependency on RHEL 6.6's subscription-manager package

CVEs

  • CVE-2014-3674
  • CVE-2014-3602

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/Technical_Notes/index.html
  • https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.1_Release_Notes/index.html#chap-Asynchronous_Errata_Updates
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Enterprise Infrastructure 2.1

SRPM
openshift-enterprise-upgrade-2.1.9-1.el6op.src.rpm SHA-256: c229e46fb34368175813a0aa6029d383594e4577468694dc448fd42a792c5e5e
openshift-origin-broker-1.16.1.14-1.el6op.src.rpm SHA-256: bc84424a7209ca469a24533a214f3874ecebadf3702419b317cf471841abc0c6
openshift-origin-broker-util-1.23.8.14-1.el6op.src.rpm SHA-256: 36e016c63be2b25c664a7b8750514e8300faffb05a8f1a1c72868f2236075b3d
rubygem-openshift-origin-controller-1.23.10.15-1.el6op.src.rpm SHA-256: 170f82d70905d15d7ee63f9f6aa538edb649e02508c6bcea590a48b4884e7aac
rubygem-openshift-origin-msg-broker-mcollective-1.23.3.6-1.el6op.src.rpm SHA-256: 7c9d9cd95552f6da80022e18a531ee653cc08ccea0271186aaf1c7e0eccdeabb
x86_64
openshift-enterprise-release-2.1.9-1.el6op.noarch.rpm SHA-256: c2b7d6e104e88a383cf7f8c51322998fae346b30e25038eafab3e6a9b71c9f89
openshift-enterprise-upgrade-broker-2.1.9-1.el6op.noarch.rpm SHA-256: 83ca853e031fa800dfb7a3e94f2cc18616304099e9df376d961a3bad7e45b4b0
openshift-enterprise-yum-validator-2.1.9-1.el6op.noarch.rpm SHA-256: ac55324db52f2c50cd22fb7ad53c0d79c6bc75e87e5019e33191da5fb86e7cfd
openshift-origin-broker-1.16.1.14-1.el6op.noarch.rpm SHA-256: e7b64582508060957331dcf98de57a1974ab27bf6cfa3dc44829081580243b87
openshift-origin-broker-util-1.23.8.14-1.el6op.noarch.rpm SHA-256: 5f7fb68c89710083d0922304d32a3810c6030a16248bd05d315881d4a930e1ae
rubygem-openshift-origin-controller-1.23.10.15-1.el6op.noarch.rpm SHA-256: 2dc64473b54e612adacc0b553b7fb3d0f68382564f89d24af28d90c8128bf33c
rubygem-openshift-origin-msg-broker-mcollective-1.23.3.6-1.el6op.noarch.rpm SHA-256: 13e143ca5364dffc8846cfe103ca32654e2a5af84f8df27491821aa50b95cfff

Red Hat OpenShift Enterprise Application Node 2.1

SRPM
openshift-enterprise-upgrade-2.1.9-1.el6op.src.rpm SHA-256: c229e46fb34368175813a0aa6029d383594e4577468694dc448fd42a792c5e5e
openshift-origin-cartridge-jbossews-1.22.3.7-1.el6op.src.rpm SHA-256: 6652c7204796fe842dafa4f318fb5547238dc39a1e0f4ceebaa7a3cc5a7f4b23
openshift-origin-msg-node-mcollective-1.22.2.3-1.el6op.src.rpm SHA-256: b4297610c6f846e1836760557c64094455dbb39572ead65f3b89fdca18659f9e
openshift-origin-node-util-1.22.20.5-1.el6op.src.rpm SHA-256: 6a06b0f05d49a37e2ed87800553e58ab6090b1b233694b7e024be04be61143e2
rubygem-openshift-origin-frontend-apache-mod-rewrite-0.5.2.2-1.el6op.src.rpm SHA-256: 9f255633ee5f1ad1d3106da83cac5fd13a9f37b92dea9823fef07670ce24e6f0
rubygem-openshift-origin-frontend-apache-vhost-0.5.2.6-1.el6op.src.rpm SHA-256: b2219a6f21cc425c4fadcc7c6d5c69107f21a25e91b7427d492e0f5b32459454
rubygem-openshift-origin-frontend-apachedb-0.4.1.2-1.el6op.src.rpm SHA-256: a10b70e1a68a63f19c07ff60aadb368c83a16afc54da53cfb528e374101dbf3b
rubygem-openshift-origin-frontend-haproxy-sni-proxy-0.3.2.2-1.el6op.src.rpm SHA-256: 118ed1c8edc121c714943c8c3c26249a22b7b85d910d327f08df9aa7ce3cc810
rubygem-openshift-origin-node-1.23.9.26-1.el6op.src.rpm SHA-256: c44aefd623c5a3342305ea172a88cc66fe095c789f139aed49b58d86158a110a
x86_64
openshift-enterprise-release-2.1.9-1.el6op.noarch.rpm SHA-256: c2b7d6e104e88a383cf7f8c51322998fae346b30e25038eafab3e6a9b71c9f89
openshift-enterprise-upgrade-node-2.1.9-1.el6op.noarch.rpm SHA-256: a594b34b612fd9a6cce2bc4cfed28f41e22b7e87975b47af52a1edc5c49089c3
openshift-enterprise-yum-validator-2.1.9-1.el6op.noarch.rpm SHA-256: ac55324db52f2c50cd22fb7ad53c0d79c6bc75e87e5019e33191da5fb86e7cfd
openshift-origin-cartridge-jbossews-1.22.3.7-1.el6op.noarch.rpm SHA-256: 6fd932d88e347cee75efe0602ac3e71caaedc5a42e288b854c6021d0d09fbc41
openshift-origin-msg-node-mcollective-1.22.2.3-1.el6op.noarch.rpm SHA-256: e18e6990304e627eb9f55ade433957a0edf04c7ba727b0f946f024965809cd78
openshift-origin-node-util-1.22.20.5-1.el6op.noarch.rpm SHA-256: a7010d2eed749c666241af5334772d5c60a696c1b12a3844b167702fd0895f9f
rubygem-openshift-origin-frontend-apache-mod-rewrite-0.5.2.2-1.el6op.noarch.rpm SHA-256: 592ad8dbc9a4194793f55d8ed88fb8e8276102f19295f7b4dbd7a8a5346725f6
rubygem-openshift-origin-frontend-apache-vhost-0.5.2.6-1.el6op.noarch.rpm SHA-256: 1cc7eefc3f23eacfcc1dd5ec3e2be7001f902c263a9734f46b77a2bd78cd9fbb
rubygem-openshift-origin-frontend-apachedb-0.4.1.2-1.el6op.noarch.rpm SHA-256: 73275d7606314341d79b7e73f9d5eee7f5105f9ae13a9fe806b0c38e5efe0b87
rubygem-openshift-origin-frontend-haproxy-sni-proxy-0.3.2.2-1.el6op.noarch.rpm SHA-256: 2a3f3b8d961ca7b3eca7f9d7a5811176d361607b0b24dadafc46718ab399ffa0
rubygem-openshift-origin-node-1.23.9.26-1.el6op.noarch.rpm SHA-256: cca17f3d6099f1b173a9a93a8e1f1ad3a8919a572a30a310239793de2356fbbb

Red Hat OpenShift Enterprise JBoss EAP add-on 2.1

SRPM
openshift-origin-cartridge-jbosseap-2.16.3.7-1.el6op.src.rpm SHA-256: b64d6a8affcc92ec640e68be1658ec3407edd9a7bf7ce4f1215bb8b870f1d4aa
x86_64
openshift-origin-cartridge-jbosseap-2.16.3.7-1.el6op.noarch.rpm SHA-256: 76644cfd36daa3bfe21655ab7c6bf5fbfe3ee82fa83840828eb953e635e3652c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility