https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=974814
https://bugzilla.redhat.com/show_bug.cgi?id=1063099
https://bugzilla.redhat.com/show_bug.cgi?id=1147758
https://bugzilla.redhat.com/show_bug.cgi?id=1147759
https://bugzilla.redhat.com/show_bug.cgi?id=1147764
https://bugzilla.redhat.com/show_bug.cgi?id=1147765
https://bugzilla.redhat.com/show_bug.cgi?id=1147766
https://bugzilla.redhat.com/show_bug.cgi?id=1147769
https://bugzilla.redhat.com/show_bug.cgi?id=1147770
https://bugzilla.redhat.com/show_bug.cgi?id=1148645
https://bugzilla.redhat.com/show_bug.cgi?id=1205615
https://bugzilla.redhat.com/show_bug.cgi?id=1205616
https://bugzilla.redhat.com/show_bug.cgi?id=1205620
https://bugzilla.redhat.com/show_bug.cgi?id=1205622
https://bugzilla.redhat.com/show_bug.cgi?id=1205623
https://bugzilla.redhat.com/show_bug.cgi?id=1205627
https://bugzilla.redhat.com/show_bug.cgi?id=1243514
https://bugzilla.redhat.com/show_bug.cgi?id=1247523
https://bugzilla.redhat.com/show_bug.cgi?id=1254880
https://bugzilla.redhat.com/show_bug.cgi?id=1256869
https://bugzilla.redhat.com/show_bug.cgi?id=1268478
https://bugzilla.redhat.com/show_bug.cgi?id=1273739
https://bugzilla.redhat.com/show_bug.cgi?id=1277329
https://bugzilla.redhat.com/show_bug.cgi?id=1277383
https://bugzilla.redhat.com/show_bug.cgi?id=1277608
https://bugzilla.redhat.com/show_bug.cgi?id=1278232
https://bugzilla.redhat.com/show_bug.cgi?id=1278630
https://bugzilla.redhat.com/show_bug.cgi?id=1279404
https://bugzilla.redhat.com/show_bug.cgi?id=1279744
https://bugzilla.redhat.com/show_bug.cgi?id=1279925
https://bugzilla.redhat.com/show_bug.cgi?id=1280216
https://bugzilla.redhat.com/show_bug.cgi?id=1280497
https://bugzilla.redhat.com/show_bug.cgi?id=1282359
https://bugzilla.redhat.com/show_bug.cgi?id=1282361
https://bugzilla.redhat.com/show_bug.cgi?id=1282362
https://bugzilla.redhat.com/show_bug.cgi?id=1282363
https://bugzilla.redhat.com/show_bug.cgi?id=1282364
https://bugzilla.redhat.com/show_bug.cgi?id=1282365
https://bugzilla.redhat.com/show_bug.cgi?id=1282366
https://bugzilla.redhat.com/show_bug.cgi?id=1282367
https://bugzilla.redhat.com/show_bug.cgi?id=1282368
https://bugzilla.redhat.com/show_bug.cgi?id=1282369
https://bugzilla.redhat.com/show_bug.cgi?id=1282371
https://bugzilla.redhat.com/show_bug.cgi?id=1282426
https://bugzilla.redhat.com/show_bug.cgi?id=1282738
https://bugzilla.redhat.com/show_bug.cgi?id=1283952
https://bugzilla.redhat.com/show_bug.cgi?id=1284506
https://bugzilla.redhat.com/show_bug.cgi?id=1287414
https://bugzilla.redhat.com/show_bug.cgi?id=1287943
https://bugzilla.redhat.com/show_bug.cgi?id=1288014
https://bugzilla.redhat.com/show_bug.cgi?id=1289603
https://bugzilla.redhat.com/show_bug.cgi?id=1289965
https://bugzilla.redhat.com/show_bug.cgi?id=1290643
https://bugzilla.redhat.com/show_bug.cgi?id=1290967
https://bugzilla.redhat.com/show_bug.cgi?id=1291795
https://bugzilla.redhat.com/show_bug.cgi?id=1291797
https://bugzilla.redhat.com/show_bug.cgi?id=1291798
https://bugzilla.redhat.com/show_bug.cgi?id=1292621
https://bugzilla.redhat.com/show_bug.cgi?id=1293251
https://bugzilla.redhat.com/show_bug.cgi?id=1293252
https://bugzilla.redhat.com/show_bug.cgi?id=1293829
https://bugzilla.redhat.com/show_bug.cgi?id=1293877
https://bugzilla.redhat.com/show_bug.cgi?id=1294115
https://bugzilla.redhat.com/show_bug.cgi?id=1294798
https://bugzilla.redhat.com/show_bug.cgi?id=1296457
https://bugzilla.redhat.com/show_bug.cgi?id=1297910
https://bugzilla.redhat.com/show_bug.cgi?id=1297916
Severity: Medium
ID: 312030
File Name: rhcos-RHSA-2016-0070.nasl
Version: 1.1
Type: Local
Agent: unix
Family: Red Hat Local Security Checks
Published: 5/4/2026
Updated: 5/4/2026
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Risk Factor: High
Score: 7.4
Vendor Severity: Important
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-1906
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
Risk Factor: Medium
Base Score: 6.9
Threat Score: 6.9
Threat Vector: CVSS:4.0/E:A
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CVSS Score Source: CVE-2015-5325
CPE: p-cpe:/a:redhat:enterprise_linux:nodejs-optimist, p-cpe:/a:redhat:enterprise_linux:nodejs-is-extglob, p-cpe:/a:redhat:enterprise_linux:nodejs-regex-cache, p-cpe:/a:redhat:enterprise_linux:nodejs-pinkie, p-cpe:/a:redhat:enterprise_linux:nodejs-fill-range, p-cpe:/a:redhat:enterprise_linux:nodejs-isobject, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-playbooks, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients-redistributable, p-cpe:/a:redhat:enterprise_linux:nodejs-glob-parent, p-cpe:/a:redhat:enterprise_linux:nodejs-semver, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.keys, p-cpe:/a:redhat:enterprise_linux:nodejs-is-plain-obj, p-cpe:/a:redhat:enterprise_linux:nodejs-ansi-green, p-cpe:/a:redhat:enterprise_linux:nodejs-xdg-basedir, p-cpe:/a:redhat:enterprise_linux:nodejs-duplexify, p-cpe:/a:redhat:enterprise_linux:nodejs-preserve, p-cpe:/a:redhat:enterprise_linux:nodejs-error-ex, p-cpe:/a:redhat:enterprise_linux:nodejs-deep-extend, p-cpe:/a:redhat:enterprise_linux:nss_wrapper, p-cpe:/a:redhat:enterprise_linux:nodejs-capture-stack-trace, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.isiterateecall, p-cpe:/a:redhat:enterprise_linux:nodejs-pinkie-promise, p-cpe:/a:redhat:enterprise_linux:nodejs-readdirp, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.assign, p-cpe:/a:redhat:enterprise_linux:nodejs-unzip-response, p-cpe:/a:redhat:enterprise_linux:nodejs-os-tmpdir, p-cpe:/a:redhat:enterprise_linux:nodejs-mkdirp, p-cpe:/a:redhat:enterprise_linux:nodejs-strip-json-comments, p-cpe:/a:redhat:enterprise_linux:nodejs-lazy-cache, p-cpe:/a:redhat:enterprise_linux:nodejs-read-all-stream, p-cpe:/a:redhat:enterprise_linux:openvswitch-devel, p-cpe:/a:redhat:enterprise_linux:nodejs-package-json, p-cpe:/a:redhat:enterprise_linux:nodejs-latest-version, p-cpe:/a:redhat:enterprise_linux:nodejs-is-stream, p-cpe:/a:redhat:enterprise_linux:nodejs-ps-tree, p-cpe:/a:redhat:enterprise_linux:nodejs-async-each, p-cpe:/a:redhat:enterprise_linux:nodejs-got, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.baseassign, p-cpe:/a:redhat:enterprise_linux:nodejs-registry-url, p-cpe:/a:redhat:enterprise_linux:nodejs-ansi-wrap, p-cpe:/a:redhat:enterprise_linux:nodejs-end-of-stream, p-cpe:/a:redhat:enterprise_linux:nodejs-is-redirect, p-cpe:/a:redhat:enterprise_linux:nodejs-is-equal-shallow, p-cpe:/a:redhat:enterprise_linux:nodejs-anymatch, p-cpe:/a:redhat:enterprise_linux:nodejs-create-error-class, p-cpe:/a:redhat:enterprise_linux:nodejs-micromatch, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.getnative, p-cpe:/a:redhat:enterprise_linux:nodejs-object-assign, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-dockerregistry, p-cpe:/a:redhat:enterprise_linux:nodejs-for-in, p-cpe:/a:redhat:enterprise_linux:nodejs-stream-combiner, p-cpe:/a:redhat:enterprise_linux:heapster, p-cpe:/a:redhat:enterprise_linux:nodejs-split, p-cpe:/a:redhat:enterprise_linux:nodejs-uuid, p-cpe:/a:redhat:enterprise_linux:nodejs-semver-diff, p-cpe:/a:redhat:enterprise_linux:jenkins, p-cpe:/a:redhat:enterprise_linux:nodejs-is-number, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.defaults, p-cpe:/a:redhat:enterprise_linux:nodejs-event-stream, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-filter-plugins, p-cpe:/a:redhat:enterprise_linux:atomic-openshift, p-cpe:/a:redhat:enterprise_linux:nodejs-is-binary-path, p-cpe:/a:redhat:enterprise_linux:openshift-ansible, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-master, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-pod, p-cpe:/a:redhat:enterprise_linux:nodejs-parse-glob, p-cpe:/a:redhat:enterprise_linux:nodejs-touch, p-cpe:/a:redhat:enterprise_linux:nodejs-node-status-codes, p-cpe:/a:redhat:enterprise_linux:nodejs-os-homedir, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.basecopy, p-cpe:/a:redhat:enterprise_linux:nodejs-success-symbol, p-cpe:/a:redhat:enterprise_linux:nodejs-repeat-element, p-cpe:/a:redhat:enterprise_linux:nodejs-prepend-http, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-sdn-ovs, p-cpe:/a:redhat:enterprise_linux:nodejs-rc, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.restparam, p-cpe:/a:redhat:enterprise_linux:nodejs-arrify, p-cpe:/a:redhat:enterprise_linux:nodejs-glob-base, p-cpe:/a:redhat:enterprise_linux:nodejs-pause-stream, p-cpe:/a:redhat:enterprise_linux:nodejs-url-parse-lax, p-cpe:/a:redhat:enterprise_linux:nodejs-for-own, p-cpe:/a:redhat:enterprise_linux:nodejs-write-file-atomic, p-cpe:/a:redhat:enterprise_linux:nodejs-string-length, p-cpe:/a:redhat:enterprise_linux:nodejs-arr-diff, p-cpe:/a:redhat:enterprise_linux:nodejs-update-notifier, p-cpe:/a:redhat:enterprise_linux:nodejs-graceful-fs, p-cpe:/a:redhat:enterprise_linux:nodejs-undefsafe, p-cpe:/a:redhat:enterprise_linux:nodejs-arr-flatten, p-cpe:/a:redhat:enterprise_linux:nodejs-extglob, p-cpe:/a:redhat:enterprise_linux:nodejs-binary-extensions, p-cpe:/a:redhat:enterprise_linux:nodejs-through, p-cpe:/a:redhat:enterprise_linux:nodejs-is-extendable, p-cpe:/a:redhat:enterprise_linux:openvswitch, p-cpe:/a:redhat:enterprise_linux:nodejs-is-glob, p-cpe:/a:redhat:enterprise_linux:nodejs-chokidar, p-cpe:/a:redhat:enterprise_linux:nodejs-expand-range, p-cpe:/a:redhat:enterprise_linux:nodejs-is-primitive, p-cpe:/a:redhat:enterprise_linux:tuned-profiles-atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:nodejs-from, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-recycle, p-cpe:/a:redhat:enterprise_linux:nodejs-align-text, p-cpe:/a:redhat:enterprise_linux:nodejs-normalize-path, p-cpe:/a:redhat:enterprise_linux:openvswitch-test, p-cpe:/a:redhat:enterprise_linux:nodejs-is-dotfile, p-cpe:/a:redhat:enterprise_linux:nodejs-expand-brackets, p-cpe:/a:redhat:enterprise_linux:nodejs-kind-of, p-cpe:/a:redhat:enterprise_linux:nodejs-ini, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-roles, p-cpe:/a:redhat:enterprise_linux:nodejs-object.omit, p-cpe:/a:redhat:enterprise_linux:nodejs-is-npm, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node, p-cpe:/a:redhat:enterprise_linux:nodejs-map-stream, p-cpe:/a:redhat:enterprise_linux:origin-kibana, p-cpe:/a:redhat:enterprise_linux:nodejs-braces, p-cpe:/a:redhat:enterprise_linux:python-openvswitch, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.bindcallback, p-cpe:/a:redhat:enterprise_linux:nodejs-duplexer, p-cpe:/a:redhat:enterprise_linux:nodejs-randomatic, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-utils, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.isarray, p-cpe:/a:redhat:enterprise_linux:nodejs-parse-json, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.createassigner, p-cpe:/a:redhat:enterprise_linux:nodejs-lowercase-keys, cpe:/o:redhat:enterprise_linux:7:coreos, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-clients, p-cpe:/a:redhat:enterprise_linux:nodejs-slide, p-cpe:/a:redhat:enterprise_linux:nodejs-lodash.isarguments, p-cpe:/a:redhat:enterprise_linux:nodejs-configstore, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-docs, p-cpe:/a:redhat:enterprise_linux:nodejs-osenv, p-cpe:/a:redhat:enterprise_linux:openshift-ansible-lookup-plugins, p-cpe:/a:redhat:enterprise_linux:nodejs-nodemon, p-cpe:/a:redhat:enterprise_linux:nodejs-timed-out, p-cpe:/a:redhat:enterprise_linux:nodejs-array-unique, p-cpe:/a:redhat:enterprise_linux:nodejs-filename-regex, p-cpe:/a:redhat:enterprise_linux:nodejs-es6-promise
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/26/2016
Vulnerability Publication Date: 6/16/2013
CISA Known Exploited Vulnerability Due Dates: 6/2/2023
CVE: CVE-2013-2186, CVE-2014-1869, CVE-2014-3661, CVE-2014-3662, CVE-2014-3663, CVE-2014-3664, CVE-2014-3666, CVE-2014-3667, CVE-2014-3680, CVE-2014-3681, CVE-2015-1806, CVE-2015-1807, CVE-2015-1808, CVE-2015-1810, CVE-2015-1812, CVE-2015-1813, CVE-2015-1814, CVE-2015-5317, CVE-2015-5318, CVE-2015-5319, CVE-2015-5320, CVE-2015-5321, CVE-2015-5322, CVE-2015-5323, CVE-2015-5324, CVE-2015-5325, CVE-2015-5326, CVE-2015-7537, CVE-2015-7538, CVE-2015-7539, CVE-2015-8103, CVE-2016-1905, CVE-2016-1906