RHBA-2016:1343
Vulnerability from csaf_redhat - Published: 2016-06-27 15:04 - Updated: 2025-11-21 17:21Summary
Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 3.2.1.1 bug fix and enhancement update
Notes
Topic
Red Hat OpenShift Enterprise release 3.2.1.1 is now available with updates to packages and images that fix several bugs and introduce feature enhancements.
Details
OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
Space precludes documenting all of the bug fixes and enhancements in this advisory. See the OpenShift Enterprise 3.2 Release Notes, which will be updated shortly for release 3.2.1.1, for details about these changes:
https://docs.openshift.com/enterprise/3.2/release_notes/ose_3_2_release_notes.html
This update includes the following images:
openshift3/openvswitch:v3.2.1.1
openshift3/ose-pod:v3.2.1.1
openshift3/ose:v3.2.1.1
openshift3/ose-docker-registry:v3.2.1.1
openshift3/ose-keepalived-ipfailover:v3.2.1.1
openshift3/ose-recycler:v3.2.1.1
openshift3/ose-f5-router:v3.2.1.1
openshift3/ose-deployer:v3.2.1.1
openshift3/node:v3.2.1.1
openshift3/ose-sti-builder:v3.2.1.1
openshift3/ose-docker-builder:v3.2.1.1
openshift3/ose-haproxy-router:v3.2.1.1
openshift3/nodejs-010-rhel7:0.10-39
openshift3/perl-516-rhel7:5.16-41
openshift3/php-55-rhel7:5.5-38
openshift3/python-33-rhel7:3.3-38
openshift3/ruby-20-rhel7:2.0-38
openshift3/mongodb-24-rhel7:2.4-30
openshift3/mysql-55-rhel7:5.5-28
openshift3/postgresql-92-rhel7:9.2-27
openshift3/logging-auth-proxy:3.2.1
openshift3/logging-curator:3.2.1
openshift3/logging-deployment:3.2.1
openshift3/logging-elasticsearch:3.2.1
openshift3/logging-fluentd:3.2.1
openshift3/logging-kibana:3.2.1
openshift3/metrics-cassandra:3.2.1
openshift3/metrics-deployer:3.2.1
openshift3/metrics-hawkular-metrics:3.2.1
openshift3/metrics-heapster:3.2.1
All OpenShift Enterprise 3 users are advised to upgrade to these updated packages and images, unless otherwise directed by Known Issues in the release notes.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Enterprise release 3.2.1.1 is now available with updates to packages and images that fix several bugs and introduce feature enhancements.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenShift Enterprise by Red Hat is the company\u0027s cloud computing Platform-as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.\n\nSpace precludes documenting all of the bug fixes and enhancements in this advisory. See the OpenShift Enterprise 3.2 Release Notes, which will be updated shortly for release 3.2.1.1, for details about these changes:\n\nhttps://docs.openshift.com/enterprise/3.2/release_notes/ose_3_2_release_notes.html\n\nThis update includes the following images:\n\nopenshift3/openvswitch:v3.2.1.1\nopenshift3/ose-pod:v3.2.1.1\nopenshift3/ose:v3.2.1.1\nopenshift3/ose-docker-registry:v3.2.1.1\nopenshift3/ose-keepalived-ipfailover:v3.2.1.1\nopenshift3/ose-recycler:v3.2.1.1\nopenshift3/ose-f5-router:v3.2.1.1\nopenshift3/ose-deployer:v3.2.1.1\nopenshift3/node:v3.2.1.1\nopenshift3/ose-sti-builder:v3.2.1.1\nopenshift3/ose-docker-builder:v3.2.1.1\nopenshift3/ose-haproxy-router:v3.2.1.1\n\nopenshift3/nodejs-010-rhel7:0.10-39\nopenshift3/perl-516-rhel7:5.16-41\nopenshift3/php-55-rhel7:5.5-38\nopenshift3/python-33-rhel7:3.3-38\nopenshift3/ruby-20-rhel7:2.0-38\nopenshift3/mongodb-24-rhel7:2.4-30\nopenshift3/mysql-55-rhel7:5.5-28\nopenshift3/postgresql-92-rhel7:9.2-27\n\nopenshift3/logging-auth-proxy:3.2.1\nopenshift3/logging-curator:3.2.1\nopenshift3/logging-deployment:3.2.1\nopenshift3/logging-elasticsearch:3.2.1\nopenshift3/logging-fluentd:3.2.1\nopenshift3/logging-kibana:3.2.1\nopenshift3/metrics-cassandra:3.2.1\nopenshift3/metrics-deployer:3.2.1\nopenshift3/metrics-hawkular-metrics:3.2.1\nopenshift3/metrics-heapster:3.2.1\n\nAll OpenShift Enterprise 3 users are advised to upgrade to these updated packages and images, unless otherwise directed by Known Issues in the release notes.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2016:1343",
"url": "https://access.redhat.com/errata/RHBA-2016:1343"
},
{
"category": "external",
"summary": "1305131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1305131"
},
{
"category": "external",
"summary": "1316275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1316275"
},
{
"category": "external",
"summary": "1320233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320233"
},
{
"category": "external",
"summary": "1322271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1322271"
},
{
"category": "external",
"summary": "1324179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324179"
},
{
"category": "external",
"summary": "1326523",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326523"
},
{
"category": "external",
"summary": "1327500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327500"
},
{
"category": "external",
"summary": "1331816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331816"
},
{
"category": "external",
"summary": "1333003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333003"
},
{
"category": "external",
"summary": "1333118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333118"
},
{
"category": "external",
"summary": "1333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333122"
},
{
"category": "external",
"summary": "1333158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333158"
},
{
"category": "external",
"summary": "1333163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333163"
},
{
"category": "external",
"summary": "1333172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333172"
},
{
"category": "external",
"summary": "1333590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333590"
},
{
"category": "external",
"summary": "1333898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333898"
},
{
"category": "external",
"summary": "1333932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333932"
},
{
"category": "external",
"summary": "1334249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334249"
},
{
"category": "external",
"summary": "1334485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334485"
},
{
"category": "external",
"summary": "1334501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334501"
},
{
"category": "external",
"summary": "1334866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334866"
},
{
"category": "external",
"summary": "1335290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335290"
},
{
"category": "external",
"summary": "1336526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336526"
},
{
"category": "external",
"summary": "1339174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339174"
},
{
"category": "external",
"summary": "1340324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340324"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhba-2016_1343.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 3.2.1.1 bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:21:25+00:00",
"generator": {
"date": "2025-11-21T17:21:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHBA-2016:1343",
"initial_release_date": "2016-06-27T15:04:04+00:00",
"revision_history": [
{
"date": "2016-06-27T15:04:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-06-27T15:04:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:21:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 3.2",
"product": {
"name": "Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:3.2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-pod@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-clients@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-tests@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-recycle@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tuned-profiles-atomic-openshift-node@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-master@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product": {
"name": "atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_id": "atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift-node@3.2.1.1-1.git.0.96f9555.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "heapster-0:1.1.0-1.beta2.el7.x86_64",
"product": {
"name": "heapster-0:1.1.0-1.beta2.el7.x86_64",
"product_id": "heapster-0:1.1.0-1.beta2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/heapster@1.1.0-1.beta2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src",
"product": {
"name": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src",
"product_id": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/atomic-openshift@3.2.1.1-1.git.0.96f9555.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "heapster-0:1.1.0-1.beta2.el7.src",
"product": {
"name": "heapster-0:1.1.0-1.beta2.el7.src",
"product_id": "heapster-0:1.1.0-1.beta2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/heapster@1.1.0-1.beta2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src"
},
"product_reference": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "heapster-0:1.1.0-1.beta2.el7.src as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.src"
},
"product_reference": "heapster-0:1.1.0-1.beta2.el7.src",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "heapster-0:1.1.0-1.beta2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.x86_64"
},
"product_reference": "heapster-0:1.1.0-1.beta2.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.2",
"product_id": "7Server-RH7-RHOSE-3.2:tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
},
"product_reference": "tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOSE-3.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-8851",
"cwe": {
"id": "CWE-331",
"name": "Insufficient Entropy"
},
"discovery_date": "2016-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1327056"
}
],
"notes": [
{
"category": "description",
"text": "It was found that NodeJS node-uuid used Math.random() to create a GUID (Globally Unique Identifier) which does not provide enough entropy (on some platforms it only provides 32 bits) which can result in collisions of GUIDs. An attacker could use this to guess GUID values and leverage further attacks against a system using node-uuid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-node-uuid: insecure entropy source - Math.random()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src",
"7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.src",
"7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.x86_64",
"7Server-RH7-RHOSE-3.2:tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-8851"
},
{
"category": "external",
"summary": "RHBZ#1327056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-8851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8851"
},
{
"category": "external",
"summary": "https://nodesecurity.io/advisories/93",
"url": "https://nodesecurity.io/advisories/93"
}
],
"release_date": "2016-03-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-06-27T15:04:04+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nSee the OpenShift Enterprise 3.2 documentation, which will be updated shortly for release 3.2.1.1, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/enterprise/3.2/release_notes/ose_3_2_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258.\n\nThe Red Hat Enterprise Linux container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com using the \"docker pull\" command. Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.",
"product_ids": [
"7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src",
"7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.src",
"7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.x86_64",
"7Server-RH7-RHOSE-3.2:tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2016:1343"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.src",
"7Server-RH7-RHOSE-3.2:atomic-openshift-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-clients-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-clients-redistributable-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-dockerregistry-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-master-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-pod-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-recycle-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-sdn-ovs-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:atomic-openshift-tests-0:3.2.1.1-1.git.0.96f9555.el7.x86_64",
"7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.src",
"7Server-RH7-RHOSE-3.2:heapster-0:1.1.0-1.beta2.el7.x86_64",
"7Server-RH7-RHOSE-3.2:tuned-profiles-atomic-openshift-node-0:3.2.1.1-1.git.0.96f9555.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nodejs-node-uuid: insecure entropy source - Math.random()"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…