RHCOS 3 : Red Hat OpenShift Enterprise 3.2 (RHSA-2016:1094)

high Nessus Plugin ID 311977

Synopsis

The remote Red Hat CoreOS host is missing one or more security updates for Red Hat OpenShift Enterprise 3.2.

Description

The remote Red Hat Enterprise Linux CoreOS 3 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2016:1094 advisory.

- 3: Untrusted content loaded via the API proxy can access web console credentials on the same domain (CVE-2016-3703)

- 3: s2i builds implicitly perform docker builds (CVE-2016-3708)

- origin: pod update allows docker socket access via build-pod (CVE-2016-3738)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHCOS Red Hat OpenShift Enterprise 3.2 package based on the guidance in RHSA-2016:1094.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1306011

https://bugzilla.redhat.com/show_bug.cgi?id=1318974

https://bugzilla.redhat.com/show_bug.cgi?id=1324996

https://bugzilla.redhat.com/show_bug.cgi?id=1329044

https://bugzilla.redhat.com/show_bug.cgi?id=1330233

https://bugzilla.redhat.com/show_bug.cgi?id=1330364

https://bugzilla.redhat.com/show_bug.cgi?id=1331229

https://bugzilla.redhat.com/show_bug.cgi?id=1333168

https://bugzilla.redhat.com/show_bug.cgi?id=1333461

http://www.nessus.org/u?bb8112c4

https://access.redhat.com/errata/RHSA-2016:1094

Plugin Details

Severity: High

ID: 311977

File Name: rhcos-RHSA-2016-1094.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/4/2026

Updated: 5/4/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2016-3738

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-tests, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-recycle, p-cpe:/a:redhat:enterprise_linux:tuned-profiles-atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, cpe:/o:redhat:enterprise_linux:7:coreos, p-cpe:/a:redhat:enterprise_linux:nodejs-node-uuid

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/19/2016

Vulnerability Publication Date: 5/19/2016

Reference Information

CVE: CVE-2016-3703, CVE-2016-3708, CVE-2016-3738

CWE: 284, 285

RHSA: 2016:1094