RHCOS 3 : Red Hat OpenShift Enterprise 3.2 (RHSA-2016:1064)

high Nessus Plugin ID 311952

Synopsis

The remote Red Hat CoreOS host is missing one or more security updates.

Description

The remote Red Hat Enterprise Linux CoreOS 3 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2016:1064 advisory.

- 3: logs from a deleted namespace can be revealed if a new namespace with the same name is created (CVE-2016-2149)

- Privilege escalation when changing root password in sti builder image (CVE-2016-2160)

- haproxy: Setting cookie containing internal IP address of a pod (CVE-2016-3711)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1293850

https://bugzilla.redhat.com/show_bug.cgi?id=1296232

https://bugzilla.redhat.com/show_bug.cgi?id=1297521

https://bugzilla.redhat.com/show_bug.cgi?id=1298942

https://bugzilla.redhat.com/show_bug.cgi?id=1299466

https://bugzilla.redhat.com/show_bug.cgi?id=1299756

https://bugzilla.redhat.com/show_bug.cgi?id=1300214

https://bugzilla.redhat.com/show_bug.cgi?id=1300298

https://bugzilla.redhat.com/show_bug.cgi?id=1300570

https://bugzilla.redhat.com/show_bug.cgi?id=1301425

https://bugzilla.redhat.com/show_bug.cgi?id=1302512

https://bugzilla.redhat.com/show_bug.cgi?id=1302894

https://bugzilla.redhat.com/show_bug.cgi?id=1303085

https://bugzilla.redhat.com/show_bug.cgi?id=1303171

https://bugzilla.redhat.com/show_bug.cgi?id=1304526

https://bugzilla.redhat.com/show_bug.cgi?id=1304582

https://bugzilla.redhat.com/show_bug.cgi?id=1304975

https://bugzilla.redhat.com/show_bug.cgi?id=1305165

https://bugzilla.redhat.com/show_bug.cgi?id=1305417

https://bugzilla.redhat.com/show_bug.cgi?id=1305765

https://bugzilla.redhat.com/show_bug.cgi?id=1306011

https://bugzilla.redhat.com/show_bug.cgi?id=1306590

https://bugzilla.redhat.com/show_bug.cgi?id=1306805

https://bugzilla.redhat.com/show_bug.cgi?id=1307013

https://bugzilla.redhat.com/show_bug.cgi?id=1307170

https://bugzilla.redhat.com/show_bug.cgi?id=1308312

https://bugzilla.redhat.com/show_bug.cgi?id=1308540

https://bugzilla.redhat.com/show_bug.cgi?id=1309192

https://bugzilla.redhat.com/show_bug.cgi?id=1309205

https://bugzilla.redhat.com/show_bug.cgi?id=1309435

https://bugzilla.redhat.com/show_bug.cgi?id=1310001

https://bugzilla.redhat.com/show_bug.cgi?id=1310062

https://bugzilla.redhat.com/show_bug.cgi?id=1310498

https://bugzilla.redhat.com/show_bug.cgi?id=1310567

https://bugzilla.redhat.com/show_bug.cgi?id=1310572

https://bugzilla.redhat.com/show_bug.cgi?id=1310587

https://bugzilla.redhat.com/show_bug.cgi?id=1310606

https://bugzilla.redhat.com/show_bug.cgi?id=1310616

https://bugzilla.redhat.com/show_bug.cgi?id=1310959

https://bugzilla.redhat.com/show_bug.cgi?id=1311024

https://bugzilla.redhat.com/show_bug.cgi?id=1311048

https://bugzilla.redhat.com/show_bug.cgi?id=1311049

https://bugzilla.redhat.com/show_bug.cgi?id=1311312

https://bugzilla.redhat.com/show_bug.cgi?id=1311396

https://bugzilla.redhat.com/show_bug.cgi?id=1312819

https://bugzilla.redhat.com/show_bug.cgi?id=1312826

https://bugzilla.redhat.com/show_bug.cgi?id=1313158

https://bugzilla.redhat.com/show_bug.cgi?id=1313210

https://bugzilla.redhat.com/show_bug.cgi?id=1313391

https://bugzilla.redhat.com/show_bug.cgi?id=1313779

https://bugzilla.redhat.com/show_bug.cgi?id=1314142

https://bugzilla.redhat.com/show_bug.cgi?id=1314270

https://bugzilla.redhat.com/show_bug.cgi?id=1314645

https://bugzilla.redhat.com/show_bug.cgi?id=1315157

https://bugzilla.redhat.com/show_bug.cgi?id=1315190

https://bugzilla.redhat.com/show_bug.cgi?id=1315563

https://bugzilla.redhat.com/show_bug.cgi?id=1315564

https://bugzilla.redhat.com/show_bug.cgi?id=1315595

https://bugzilla.redhat.com/show_bug.cgi?id=1315607

https://bugzilla.redhat.com/show_bug.cgi?id=1315637

https://bugzilla.redhat.com/show_bug.cgi?id=1316050

https://bugzilla.redhat.com/show_bug.cgi?id=1316127

https://bugzilla.redhat.com/show_bug.cgi?id=1316216

https://bugzilla.redhat.com/show_bug.cgi?id=1316233

https://bugzilla.redhat.com/show_bug.cgi?id=1316267

https://bugzilla.redhat.com/show_bug.cgi?id=1316698

https://bugzilla.redhat.com/show_bug.cgi?id=1316761

https://bugzilla.redhat.com/show_bug.cgi?id=1317097

https://bugzilla.redhat.com/show_bug.cgi?id=1317577

https://bugzilla.redhat.com/show_bug.cgi?id=1317835

https://bugzilla.redhat.com/show_bug.cgi?id=1317851

https://bugzilla.redhat.com/show_bug.cgi?id=1318395

https://bugzilla.redhat.com/show_bug.cgi?id=1318681

https://bugzilla.redhat.com/show_bug.cgi?id=1318726

https://bugzilla.redhat.com/show_bug.cgi?id=1318975

https://bugzilla.redhat.com/show_bug.cgi?id=1319439

https://bugzilla.redhat.com/show_bug.cgi?id=1320053

https://bugzilla.redhat.com/show_bug.cgi?id=1320335

https://bugzilla.redhat.com/show_bug.cgi?id=1320430

https://bugzilla.redhat.com/show_bug.cgi?id=1320719

https://bugzilla.redhat.com/show_bug.cgi?id=1320752

https://bugzilla.redhat.com/show_bug.cgi?id=1320939

https://bugzilla.redhat.com/show_bug.cgi?id=1320951

https://bugzilla.redhat.com/show_bug.cgi?id=1321258

https://bugzilla.redhat.com/show_bug.cgi?id=1321289

https://bugzilla.redhat.com/show_bug.cgi?id=1321308

https://bugzilla.redhat.com/show_bug.cgi?id=1321309

https://bugzilla.redhat.com/show_bug.cgi?id=1321569

https://bugzilla.redhat.com/show_bug.cgi?id=1322077

https://bugzilla.redhat.com/show_bug.cgi?id=1322314

https://bugzilla.redhat.com/show_bug.cgi?id=1322335

https://bugzilla.redhat.com/show_bug.cgi?id=1322338

https://bugzilla.redhat.com/show_bug.cgi?id=1322538

https://bugzilla.redhat.com/show_bug.cgi?id=1322718

https://bugzilla.redhat.com/show_bug.cgi?id=1322788

https://bugzilla.redhat.com/show_bug.cgi?id=1322942

https://bugzilla.redhat.com/show_bug.cgi?id=1323123

https://bugzilla.redhat.com/show_bug.cgi?id=1323633

https://bugzilla.redhat.com/show_bug.cgi?id=1324273

https://bugzilla.redhat.com/show_bug.cgi?id=1324357

https://bugzilla.redhat.com/show_bug.cgi?id=1324418

https://bugzilla.redhat.com/show_bug.cgi?id=1326214

https://bugzilla.redhat.com/show_bug.cgi?id=1326319

https://bugzilla.redhat.com/show_bug.cgi?id=1326446

https://bugzilla.redhat.com/show_bug.cgi?id=1327126

https://bugzilla.redhat.com/show_bug.cgi?id=1328067

https://bugzilla.redhat.com/show_bug.cgi?id=1328822

https://bugzilla.redhat.com/show_bug.cgi?id=1329370

https://bugzilla.redhat.com/show_bug.cgi?id=1330050

https://access.redhat.com/security/updates/classification/#important

http://www.nessus.org/u?0e189937

https://bugzilla.redhat.com/show_bug.cgi?id=1252520

https://bugzilla.redhat.com/show_bug.cgi?id=1264500

https://bugzilla.redhat.com/show_bug.cgi?id=1273149

https://bugzilla.redhat.com/show_bug.cgi?id=1276038

https://bugzilla.redhat.com/show_bug.cgi?id=1278719

https://bugzilla.redhat.com/show_bug.cgi?id=1278974

https://bugzilla.redhat.com/show_bug.cgi?id=1279344

https://bugzilla.redhat.com/show_bug.cgi?id=1282733

https://bugzilla.redhat.com/show_bug.cgi?id=1284700

https://bugzilla.redhat.com/show_bug.cgi?id=1285763

https://bugzilla.redhat.com/show_bug.cgi?id=1291958

https://bugzilla.redhat.com/show_bug.cgi?id=1293805

https://bugzilla.redhat.com/show_bug.cgi?id=1293830

https://bugzilla.redhat.com/show_bug.cgi?id=1331038

http://www.nessus.org/u?14cec3f8

https://access.redhat.com/errata/RHSA-2016:1064

Plugin Details

Severity: High

ID: 311952

File Name: rhcos-RHSA-2016-1064.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/4/2026

Updated: 5/4/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2016-2160

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:nodejs-proxy-addr, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:nodejs-openshift-auth-proxy, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-recycle, p-cpe:/a:redhat:enterprise_linux:tuned-profiles-atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, cpe:/o:redhat:enterprise_linux:7:coreos

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/12/2016

Vulnerability Publication Date: 3/9/2016

Reference Information

CVE: CVE-2016-2149, CVE-2016-2160, CVE-2016-3711

CWE: 200, 285

RHSA: 2016:1064