RHCOS 2 : Red Hat OpenShift Enterprise 2.1.9 (RHSA-2014:1906)

high Nessus Plugin ID 311979

Synopsis

The remote Red Hat CoreOS host is missing one or more security updates.

Description

The remote Red Hat Enterprise Linux CoreOS 2 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2014:1906 advisory.

- OpenShift: /proc/net/tcp information disclosure (CVE-2014-3602)

- Enterprise: gears fail to properly isolate network traffic (CVE-2014-3674)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?877cb823

http://www.nessus.org/u?6cb4e00a

https://bugzilla.redhat.com/show_bug.cgi?id=1131680

https://bugzilla.redhat.com/show_bug.cgi?id=1143991

https://bugzilla.redhat.com/show_bug.cgi?id=1148170

https://bugzilla.redhat.com/show_bug.cgi?id=1149837

https://bugzilla.redhat.com/show_bug.cgi?id=1153319

https://bugzilla.redhat.com/show_bug.cgi?id=1155794

https://bugzilla.redhat.com/show_bug.cgi?id=1163502

http://www.nessus.org/u?5cda0179

https://access.redhat.com/errata/RHSA-2014:1906

Plugin Details

Severity: High

ID: 311979

File Name: rhcos-RHSA-2014-1906.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/4/2026

Updated: 5/4/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2014-3674

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2014-3602

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-haproxy-sni-proxy, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker-util, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-apache-vhost, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-apache-mod-rewrite, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade-broker, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-node, p-cpe:/a:redhat:enterprise_linux:openshift-origin-broker, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbosseap, p-cpe:/a:redhat:enterprise_linux:openshift-origin-node-util, p-cpe:/a:redhat:enterprise_linux:openshift-origin-cartridge-jbossews, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-release, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-frontend-apachedb, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-controller, p-cpe:/a:redhat:enterprise_linux:openshift-origin-msg-node-mcollective, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-yum-validator, cpe:/o:redhat:enterprise_linux:6:coreos, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-upgrade-node, p-cpe:/a:redhat:enterprise_linux:rubygem-openshift-origin-msg-broker-mcollective

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/25/2014

Vulnerability Publication Date: 11/3/2014

Reference Information

CVE: CVE-2014-3602, CVE-2014-3674

CWE: 200, 284

RHSA: 2014:1906