Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2016:0489 - Security Advisory
Issued:
2016-03-22
Updated:
2016-03-22

RHSA-2016:0489 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat OpenShift Enterprise 2.2.9 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat OpenShift Enterprise release 2.2.9, which fixes several
security issues, several bugs, and introduces feature enhancements, is
now available.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or
private cloud deployments.

The following security issue is addressed with this release:

It was found that ActiveMQ did not safely handle user supplied data
when deserializing objects. A remote attacker could use this flaw to
execute arbitrary code with the permissions of the ActiveMQ
application. (CVE-2015-5254)

An update for Jenkins Continuous Integration Server that addresses a
large number of security issues including XSS, CSRF, information
disclosure and code execution have been addressed as well.
(CVE-2015-5317, CVE-2015-5318, CVE-2015-5319, CVE-2015-5320,
CVE-2015-5321, CVE-2015-5322, CVE-2015-5323, CVE-2015-5324,
CVE-2015-5325, CVE-2015-5326, CVE-2015-7537, CVE-2015-7538,
CVE-2015-7539, CVE-2015-8103)

Space precludes documenting all of the bug fixes in this advisory. See
the OpenShift Enterprise Technical Notes, which will be updated
shortly for release 2.2.9, for details about these changes:

https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/Technical_Notes/index.html

All OpenShift Enterprise 2 users are advised to upgrade to these
updated packages.

Solution

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

See the OpenShift Enterprise 2.2 Release Notes, which will be
updated shortly for release 2.2.9, for important instructions on how
to fully apply this asynchronous errata update:

https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates

This update is available via the Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at:
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenShift Enterprise Application Node 2.2 x86_64

Fixes

  • BZ - 1111456 - jenkin app will be created as default small gear size when user create app with --enable-jenkins and non-default gear-size
  • BZ - 1140816 - oo-admin-ctl-district missing documentation for listing districts
  • BZ - 1160934 - "oo-admin-ctl-gears stopgear" failed to stop idled gear
  • BZ - 1168480 - Should prompt correct information when execute oo-admin-ctl-user --addgearsize $invalid value
  • BZ - 1169690 - Webconsole should show warning info when add cartridge as quota used up to QUOTA_WARNING_PERCENT
  • BZ - 1265423 - .gitconfig is not configurable for application create
  • BZ - 1265811 - oo-accept-node reports a quota failures when a loop device is used.
  • BZ - 1279584 - Users have nil value for resulting in failed oo-admin-repair
  • BZ - 1282359 - CVE-2015-5317 jenkins: Project name disclosure via fingerprints (SECURITY-153)
  • BZ - 1282361 - CVE-2015-5318 jenkins: Public value used for CSRF protection salt (SECURITY-169)
  • BZ - 1282362 - CVE-2015-5319 jenkins: XXE injection into job configurations via CLI (SECURITY-173)
  • BZ - 1282363 - CVE-2015-5320 jenkins: Secret key not verified when connecting a slave (SECURITY-184)
  • BZ - 1282364 - CVE-2015-5321 jenkins: Information disclosure via sidepanel (SECURITY-192)
  • BZ - 1282365 - CVE-2015-5322 jenkins: Local file inclusion vulnerability (SECURITY-195)
  • BZ - 1282366 - CVE-2015-5323 jenkins: API tokens of other users available to admins (SECURITY-200)
  • BZ - 1282367 - CVE-2015-5324 jenkins: Queue API did show items not visible to the current user (SECURITY-186)
  • BZ - 1282368 - CVE-2015-5325 jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206)
  • BZ - 1282369 - CVE-2015-5326 jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214)
  • BZ - 1282371 - CVE-2015-8103 jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218)
  • BZ - 1283372 - oo-admin-gear man page displays wrong option
  • BZ - 1291292 - CVE-2015-5254 activemq: unsafe deserialization
  • BZ - 1291795 - CVE-2015-7537 jenkins: CSRF vulnerability in some administrative actions (SECURITY-225)
  • BZ - 1291797 - CVE-2015-7538 jenkins: CSRF protection ineffective (SECURITY-233)
  • BZ - 1291798 - CVE-2015-7539 jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234)
  • BZ - 1294513 - oo-diagnostics test_enterprise_rpms fails for nodejs010-nodejs-debug
  • BZ - 1299014 - [RFE] Configuration setting to set cipher on Openshift node web proxy
  • BZ - 1299095 - oo-diagnostic error on broker No such file or directory - /etc/openshift/env/OPENSHIFT_BROKER_HOST
  • BZ - 1302787 - Node web proxy configuration file is overwritten upon update
  • BZ - 1305688 - oo-accept-broker incorrectly parses MONGO_HOST_PORT individual host and ports
  • BZ - 1307174 - rhc ssh <appname> does not respect PATH env variable, nor the --ssh PATH option
  • BZ - 1307175 - oo-accept-node does not validate whether threads are in cgroups
  • BZ - 1308716 - rhc snapshot save different app with the same name in the same dir didn't prompt conflict information
  • BZ - 1308718 - It is better to return meaningful error message when do ssh in head gear of scalable app with incorrect user id or ssh url
  • BZ - 1308720 - Unable to deploy Drupal
  • BZ - 1308722 - Django quickstart can't bind address
  • BZ - 1308739 - It will not validate the deployment type when do app deploy via REST API
  • BZ - 1310247 - New configuration item, TRAFFIC_CONTROL_DEVS
  • BZ - 1310266 - https using letsencrypt has B rating - chain incomplete
  • BZ - 1310841 - Fix zsh autocompletion for rhc
  • BZ - 1314535 - oo-admin-repair-node,oo-admin-ctl-iptables-port-proxy and oo-admin-ctl-tc has no man page
  • BZ - 1314546 - Python cartridge doesn't stop deploy process when it failed to install packages (It is different from behavior of other cartridges)

CVEs

  • CVE-2015-7538
  • CVE-2015-7539
  • CVE-2015-5318
  • CVE-2015-7537
  • CVE-2015-5320
  • CVE-2015-5317
  • CVE-2015-8103
  • CVE-2015-5324
  • CVE-2015-5325
  • CVE-2015-5254
  • CVE-2015-5326
  • CVE-2015-5321
  • CVE-2015-5319
  • CVE-2015-5323
  • CVE-2015-5322

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Enterprise Application Node 2.2

SRPM
activemq-5.9.0-6.redhat.611454.el6op.src.rpm SHA-256: dc9c2da0163073d72e87a6ca68094d4f7a8b0ae48296ac70fc1e0585ccc49031
jenkins-1.625.3-1.el6op.src.rpm SHA-256: 8dbc6503904bd238fa22c2a2baa383fefd75572a207fefae1cd07fbe342069a5
openshift-enterprise-upgrade-2.2.9-1.el6op.src.rpm SHA-256: a983269c160048026ffc94eba00b0566a6f8b218b7525db5166ef004a8104651
openshift-origin-cartridge-cron-1.25.2.1-1.el6op.src.rpm SHA-256: 4f8bb9529f0ac4d543a3a9d52284051f9b9f7db092604358f722ca825c1f4547
openshift-origin-cartridge-haproxy-1.31.5.1-1.el6op.src.rpm SHA-256: ed378d2892379172b7c7b28f699fcfa472c95240983f5121351b5b3175ac7f1f
openshift-origin-cartridge-mysql-1.31.2.1-1.el6op.src.rpm SHA-256: 0619d6b34b9d31da70981e6fbde88cabbbf6e132476c6502f539252e98cf98d9
openshift-origin-cartridge-php-1.35.3.1-1.el6op.src.rpm SHA-256: 97c06d654a97ccf12a07a406ee16e62813da1580c0e3a3dcebc824354333b146
openshift-origin-cartridge-python-1.34.2.1-1.el6op.src.rpm SHA-256: d241cf3bfc22cf3e1cdd33d8b895845fad92287528bf23d10f8f76aada98cd35
openshift-origin-msg-node-mcollective-1.30.2.1-1.el6op.src.rpm SHA-256: d50c781f3a2172d05a39e266e673c5ebae590ea08ba444c23ef911df80ac56b7
openshift-origin-node-proxy-1.26.2.1-1.el6op.src.rpm SHA-256: 5ab462c5dae135311aed99881f7842b02db6474e72413a4abba9eabcfb912323
openshift-origin-node-util-1.38.6.2-1.el6op.src.rpm SHA-256: dfcddf9f5571c07c32bfd1bd9a5823a352c2a1e3869d738f25f6733a1f9fc034
php-5.3.3-46.el6_7.1.src.rpm SHA-256: d3d8dbeff27cb144aa852c543a1bb3134170bd7ec7d216831cb86397b5e9daa9
rubygem-openshift-origin-common-1.29.5.2-1.el6op.src.rpm SHA-256: 1f9a40b519820de75d82f087fbd2d86a0daf3b698f2c82b4ed1832a10bf745d8
rubygem-openshift-origin-frontend-apache-vhost-0.13.2.1-1.el6op.src.rpm SHA-256: 4b7d531d0c30a1aaddd8950de978cdfc698a876f9e472adc334ffcc3100ed9b0
rubygem-openshift-origin-node-1.38.5.3-1.el6op.src.rpm SHA-256: 2922f8cabf6d09998260ce1b4f911c4cef9da70cb4816f1f689409432dc39522
x86_64
activemq-client-5.9.0-6.redhat.611454.el6op.x86_64.rpm SHA-256: 7694e9c101c1f970339d06306e40b78189cf2421c5c46fbc75617709949866eb
jenkins-1.625.3-1.el6op.noarch.rpm SHA-256: ac825fa1b894f301456c98df1023902feea67da3401edca60ddd90f604d751f8
openshift-enterprise-release-2.2.9-1.el6op.noarch.rpm SHA-256: 3ee5f802a90715ae9c66c85dac1067c0fc16a92b6095e9e94be1f28d406271c5
openshift-enterprise-upgrade-node-2.2.9-1.el6op.noarch.rpm SHA-256: e71043c92c68ee0925c7554a5e593d5274710961af3d6425fcd3e6fbb862a131
openshift-enterprise-yum-validator-2.2.9-1.el6op.noarch.rpm SHA-256: 1a2066e4690af15ebd4deb6f353bd8bf46232a53f4d309af2129dcdf767cda45
openshift-origin-cartridge-cron-1.25.2.1-1.el6op.noarch.rpm SHA-256: 8d3c6105ab13966d428848ab9f95ff2f7819fc299072fbddaddf445726d18ad0
openshift-origin-cartridge-haproxy-1.31.5.1-1.el6op.noarch.rpm SHA-256: c68663dbbc7bf6ea7e90dd254af35881813138bf04244f03ab76e04e7e5e2932
openshift-origin-cartridge-mysql-1.31.2.1-1.el6op.noarch.rpm SHA-256: 70aa5bdeb9b205a53367bbc3b1bae56d68bb0598b255c994621dc78eedd10ffc
openshift-origin-cartridge-php-1.35.3.1-1.el6op.noarch.rpm SHA-256: be21ced5ec69aacb015843b3af732781acade1f3ae337825ef7cec6a94dbee19
openshift-origin-cartridge-python-1.34.2.1-1.el6op.noarch.rpm SHA-256: 3cd3ca506a9d9b4d01d8d357bc694b8bcfda0d06778436e289793a5303902958
openshift-origin-msg-node-mcollective-1.30.2.1-1.el6op.noarch.rpm SHA-256: fb9b696a2a615a04d9f80e579bd2ca34182478857f7d1a60f56b6de9ead75d66
openshift-origin-node-proxy-1.26.2.1-1.el6op.noarch.rpm SHA-256: b597148a04f5358f6534c39811bcff40636d94fd40ebd8c0254e967660db89c1
openshift-origin-node-util-1.38.6.2-1.el6op.noarch.rpm SHA-256: 798843f8104908d82957c1eefa0a1f36c563ddf2ef8b78276a114f3aa117a3f0
php-bcmath-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 9003f3dd31ae6da68b252eba237af5bff3c972cc22e1273abfc8cff1947b9f23
php-debuginfo-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: fcdadd597690ca04aebc003dcf06cd3954e639eb357e2d8d72803c57c49b371d
php-devel-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: b8f6db4ce22a46e62975d4890645f8ee1ff2b93eb1a95b2d24b94a0533ccb354
php-fpm-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: e26940c8acc51f7f87470fa64319c0f53fd1f6b36d3d77f334414fd27207a385
php-imap-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: cdac3c3ac72a486098de71a4a905318a380f7f4d0b01030fe7a4f7b0d3e4f8d4
php-intl-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 3851084b3726a811e622355ee7bb9cafeca1c39af9364a735efa91c44872852d
php-mbstring-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 289233dab4d5694b8fceab04955085f17a47d45efa7533c9320e6e62a847fcbe
php-process-5.3.3-46.el6_7.1.x86_64.rpm SHA-256: 03602b07ffbf033a3ce0d72918e4957e7785c2b893277138d9fb6d537b5273cc
rubygem-openshift-origin-common-1.29.5.2-1.el6op.noarch.rpm SHA-256: 55dd22e8098a3675e2157a9ed8a3fb97e8aadc43f8c18bca2009ecee4632dfce
rubygem-openshift-origin-frontend-apache-vhost-0.13.2.1-1.el6op.noarch.rpm SHA-256: 45a300497fdc94a9b5edfe0e29b8eb2e366cba23174d6803ffca403d51c01bd0
rubygem-openshift-origin-node-1.38.5.3-1.el6op.noarch.rpm SHA-256: dc8cf345296b7455bbc532d53ebab698a5f90addf4cf8b9e73506f6d0eb8a7ac

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility