Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0489 - Security Advisory
Issued:
2016-03-22
Updated:
2016-03-22

RHSA-2016:0489 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat OpenShift Enterprise 2.2.9 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Enterprise release 2.2.9, which fixes several
security issues, several bugs, and introduces feature enhancements, is
now available.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or
private cloud deployments.

The following security issue is addressed with this release:

It was found that ActiveMQ did not safely handle user supplied data
when deserializing objects. A remote attacker could use this flaw to
execute arbitrary code with the permissions of the ActiveMQ
application. (CVE-2015-5254)

An update for Jenkins Continuous Integration Server that addresses a
large number of security issues including XSS, CSRF, information
disclosure and code execution have been addressed as well.
(CVE-2015-5317, CVE-2015-5318, CVE-2015-5319, CVE-2015-5320,
CVE-2015-5321, CVE-2015-5322, CVE-2015-5323, CVE-2015-5324,
CVE-2015-5325, CVE-2015-5326, CVE-2015-7537, CVE-2015-7538,
CVE-2015-7539, CVE-2015-8103)

Space precludes documenting all of the bug fixes in this advisory. See
the OpenShift Enterprise Technical Notes, which will be updated
shortly for release 2.2.9, for details about these changes:

https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/Technical_Notes/index.html

All OpenShift Enterprise 2 users are advised to upgrade to these
updated packages.

Solution

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

See the OpenShift Enterprise 2.2 Release Notes, which will be
updated shortly for release 2.2.9, for important instructions on how
to fully apply this asynchronous errata update:

https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates

This update is available via the Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at:
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenShift Enterprise Application Node 2.2 x86_64

Fixes

  • BZ - 1111456 - jenkin app will be created as default small gear size when user create app with --enable-jenkins and non-default gear-size
  • BZ - 1140816 - oo-admin-ctl-district missing documentation for listing districts
  • BZ - 1160934 - "oo-admin-ctl-gears stopgear" failed to stop idled gear
  • BZ - 1168480 - Should prompt correct information when execute oo-admin-ctl-user --addgearsize $invalid value
  • BZ - 1169690 - Webconsole should show warning info when add cartridge as quota used up to QUOTA_WARNING_PERCENT
  • BZ - 1265423 - .gitconfig is not configurable for application create
  • BZ - 1265811 - oo-accept-node reports a quota failures when a loop device is used.
  • BZ - 1279584 - Users have nil value for resulting in failed oo-admin-repair
  • BZ - 1282359 - CVE-2015-5317 jenkins: Project name disclosure via fingerprints (SECURITY-153)
  • BZ - 1282361 - CVE-2015-5318 jenkins: Public value used for CSRF protection salt (SECURITY-169)
  • BZ - 1282362 - CVE-2015-5319 jenkins: XXE injection into job configurations via CLI (SECURITY-173)
  • BZ - 1282363 - CVE-2015-5320 jenkins: Secret key not verified when connecting a slave (SECURITY-184)
  • BZ - 1282364 - CVE-2015-5321 jenkins: Information disclosure via sidepanel (SECURITY-192)
  • BZ - 1282365 - CVE-2015-5322 jenkins: Local file inclusion vulnerability (SECURITY-195)
  • BZ - 1282366 - CVE-2015-5323 jenkins: API tokens of other users available to admins (SECURITY-200)
  • BZ - 1282367 - CVE-2015-5324 jenkins: Queue API did show items not visible to the current user (SECURITY-186)
  • BZ - 1282368 - CVE-2015-5325 jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206)
  • BZ - 1282369 - CVE-2015-5326 jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214)
  • BZ - 1282371 - CVE-2015-8103 jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218)
  • BZ - 1283372 - oo-admin-gear man page displays wrong option
  • BZ - 1291292 - CVE-2015-5254 activemq: unsafe deserialization
  • BZ - 1291795 - CVE-2015-7537 jenkins: CSRF vulnerability in some administrative actions (SECURITY-225)
  • BZ - 1291797 - CVE-2015-7538 jenkins: CSRF protection ineffective (SECURITY-233)
  • BZ - 1291798 - CVE-2015-7539 jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234)
  • BZ - 1294513 - oo-diagnostics test_enterprise_rpms fails for nodejs010-nodejs-debug
  • BZ - 1299014 - [RFE] Configuration setting to set cipher on Openshift node web proxy
  • BZ - 1299095 - oo-diagnostic error on broker No such file or directory - /etc/openshift/env/OPENSHIFT_BROKER_HOST
  • BZ - 1302787 - Node web proxy configuration file is overwritten upon update
  • BZ - 1305688 - oo-accept-broker incorrectly parses MONGO_HOST_PORT individual host and ports
  • BZ - 1307174 - rhc ssh <appname> does not respect PATH env variable, nor the --ssh PATH option
  • BZ - 1307175 - oo-accept-node does not validate whether threads are in cgroups
  • BZ - 1308716 - rhc snapshot save different app with the same name in the same dir didn't prompt conflict information
  • BZ - 1308718 - It is better to return meaningful error message when do ssh in head gear of scalable app with incorrect user id or ssh url
  • BZ - 1308720 - Unable to deploy Drupal
  • BZ - 1308722 - Django quickstart can't bind address
  • BZ - 1308739 - It will not validate the deployment type when do app deploy via REST API
  • BZ - 1310247 - New configuration item, TRAFFIC_CONTROL_DEVS
  • BZ - 1310266 - https using letsencrypt has B rating - chain incomplete
  • BZ - 1310841 - Fix zsh autocompletion for rhc
  • BZ - 1314535 - oo-admin-repair-node,oo-admin-ctl-iptables-port-proxy and oo-admin-ctl-tc has no man page
  • BZ - 1314546 - Python cartridge doesn't stop deploy process when it failed to install packages (It is different from behavior of other cartridges)

CVEs

  • CVE-2015-7538
  • CVE-2015-7539
  • CVE-2015-5318
  • CVE-2015-7537
  • CVE-2015-5320
  • CVE-2015-5317
  • CVE-2015-8103
  • CVE-2015-5324
  • CVE-2015-5325
  • CVE-2015-5254
  • CVE-2015-5326
  • CVE-2015-5321
  • CVE-2015-5319
  • CVE-2015-5323
  • CVE-2015-5322

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Enterprise Application Node 2.2

SRPM
activemq-5.9.0-6.redhat.611454.el6op.src.rpm SHA-256: dc9c2da0163073d72e87a6ca68094d4f7a8b0ae48296ac70fc1e0585ccc49031
jenkins-1.625.3-1.el6op.src.rpm SHA-256: 8dbc6503904bd238fa22c2a2baa383fefd75572a207fefae1cd07fbe342069a5
openshift-enterprise-upgrade-2.2.9-1.el6op.src.rpm SHA-256: a983269c160048026ffc94eba00b0566a6f8b218b7525db5166ef004a8104651
openshift-origin-cartridge-cron-1.25.2.1-1.el6op.src.rpm SHA-256: 4f8bb9529f0ac4d543a3a9d52284051f9b9f7db092604358f722ca825c1f4547
openshift-origin-cartridge-haproxy-1.31.5.1-1.el6op.src.rpm SHA-256: ed378d2892379172b7c7b28f699fcfa472c95240983f5121351b5b3175ac7f1f
openshift-origin-cartridge-mysql-1.31.2.1-1.el6op.src.rpm SHA-256: 0619d6b34b9d31da70981e6fbde88cabbbf6e132476c6502f539252e98cf98d9
openshift-origin-cartridge-php-1.35.3.1-1.el6op.src.rpm SHA-256: 97c06d654a97ccf12a07a406ee16e62813da1580c0e3a3dcebc824354333b146
openshift-origin-cartridge-python-1.34.2.1-1.el6op.src.rpm SHA-256: d241cf3bfc22cf3e1cdd33d8b895845fad92287528bf23d10f8f76aada98cd35
openshift-origin-msg-node-mcollective-1.30.2.1-1.el6op.src.rpm SHA-256: d50c781f3a2172d05a39e266e673c5ebae590ea08ba444c23ef911df80ac56b7
openshift-origin-node-proxy-1.26.2.1-1.el6op.src.rpm SHA-256: 5ab462c5dae135311aed99881f7842b02db6474e72413a4abba9eabcfb912323
openshift-origin-node-util-1.38.6.2-1.el6op.src.rpm SHA-256: dfcddf9f5571c07c32bfd1bd9a5823a352c2a1e3869d738f25f6733a1f9fc034
php-5.3.3-46.el6_7.1.src.rpm SHA-256: d3d8dbeff27cb144aa852c543a1bb3134170bd7ec7d216831cb86397b5e9daa9
rubygem-openshift-origin-common-1.29.5.2-1.el6op.src.rpm SHA-256: 1f9a40b519820de75d82f087fbd2d86a0daf3b698f2c82b4ed1832a10bf745d8
rubygem-openshift-origin-frontend-apache-vhost-0.13.2.1-1.el6op.src.rpm SHA-256: 4b7d531d0c30a1aaddd8950de978cdfc698a876f9e472adc334ffcc3100ed9b0
rubygem-openshift-origin-node-1.38.5.3-1.el6op.src.rpm SHA-256: 2922f8cabf6d09998260ce1b4f911c4cef9da70cb4816f1f689409432dc39522
x86_64
activemq-client-5.9.0-6.redhat.611454.el6op.x86_64.rpm SHA-256: 7694e9c101c1f970339d06306e40b78189cf2421c5c46fbc75617709949866eb
jenkins-1.625.3-1.el6op.noarch.rpm SHA-256: ac825fa1b894f301456c98df1023902feea67da3401edca60ddd90f604d751f8
openshift-enterprise-release-2.2.9-1.el6op.noarch.rpm SHA-256: 3ee5f802a90715ae9c66c85dac1067c0fc16a92b6095e9e94be1f28d406271c5
openshift-enterprise-upgrade-node-2.2.9-1.el6op.noarch.rpm SHA-256: e71043c92c68ee0925c7554a5e593d5274710961af3d6425fcd3e6fbb862a131
openshift-enterprise-yum-validator-2.2.9-1.el6op.noarch.rpm SHA-256: 1a2066e4690af15ebd4deb6f353bd8bf46232a53f4d309af2129dcdf767cda45
openshift-origin-cartridge-cron-1.25.2.1-1.el6op.noarch.rpm SHA-256: 8d3c6105ab13966d428848ab9f95ff2f7819fc299072fbddaddf445726d18ad0
openshift-origin-cartridge-haproxy-1.31.5.1-1.el6op.noarch.rpm SHA-256: c68663dbbc7bf6ea7e90dd254af35881813138bf04244f03ab76e04e7e5e2932
openshift-origin-cartridge-mysql-1.31.2.1-1.el6op.noarch.rpm SHA-256: 70aa5bdeb9b205a53367bbc3b1bae56d68bb0598b255c994621dc78eedd10ffc
openshift-origin-cartridge-php-1.35.3.1-1.el6op.noarch.rpm SHA-256: be21ced5ec69aacb015843b3af732781acade1f3ae337825ef7cec6a94dbee19
openshift-origin-cartridge-python-1.34.2.1-1.el6op.noarch.rpm SHA-256: 3cd3ca506a9d9b4d01d8d357bc694b8bcfda0d06778436e289793a5303902958
openshift-origin-msg-node-mcollective-1.30.2.1-1.el6op.noarch.rpm SHA-256: fb9b696a2a615a04d9f80e579bd2ca34182478857f7d1a60f56b6de9ead75d66
openshift-origin-node-proxy-1.26.2.1-1.el6op.noarch.rpm SHA-256: b597148a04f5358f6534c39811bcff40636d94fd40ebd8c0254e967660db89c1
openshift-origin-node-util-1.38.6.2-1.el6op.noarch.rpm SHA-256: 798843f8104908d82957c1eefa0a1f36c563ddf2ef8b78276a114f3aa117a3f0
php-bcmath-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 9003f3dd31ae6da68b252eba237af5bff3c972cc22e1273abfc8cff1947b9f23
php-debuginfo-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: fcdadd597690ca04aebc003dcf06cd3954e639eb357e2d8d72803c57c49b371d
php-devel-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: b8f6db4ce22a46e62975d4890645f8ee1ff2b93eb1a95b2d24b94a0533ccb354
php-fpm-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: e26940c8acc51f7f87470fa64319c0f53fd1f6b36d3d77f334414fd27207a385
php-imap-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: cdac3c3ac72a486098de71a4a905318a380f7f4d0b01030fe7a4f7b0d3e4f8d4
php-intl-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 3851084b3726a811e622355ee7bb9cafeca1c39af9364a735efa91c44872852d
php-mbstring-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 289233dab4d5694b8fceab04955085f17a47d45efa7533c9320e6e62a847fcbe
php-process-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 03602b07ffbf033a3ce0d72918e4957e7785c2b893277138d9fb6d537b5273cc
rubygem-openshift-origin-common-1.29.5.2-1.el6op.noarch.rpm SHA-256: 55dd22e8098a3675e2157a9ed8a3fb97e8aadc43f8c18bca2009ecee4632dfce
rubygem-openshift-origin-frontend-apache-vhost-0.13.2.1-1.el6op.noarch.rpm SHA-256: 45a300497fdc94a9b5edfe0e29b8eb2e366cba23174d6803ffca403d51c01bd0
rubygem-openshift-origin-node-1.38.5.3-1.el6op.noarch.rpm SHA-256: dc8cf345296b7455bbc532d53ebab698a5f90addf4cf8b9e73506f6d0eb8a7ac

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Statement effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter