-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenShift Enterprise security update
Advisory ID:       RHSA-2016:1605-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2016:1605
Issue date:        2016-08-11
CVE Names:         CVE-2016-1000022 CVE-2016-1000023 
====================================================================
1. Summary:

An update is now available for Red Hat OpenShift Enterprise 3.1 and Red Hat
OpenShift Enterprise 3.2.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenShift Enterprise 3.1 - noarch
Red Hat OpenShift Enterprise 3.2 - noarch

3. Description:

OpenShift Enterprise by Red Hat is the company's cloud computing Platform-
as-a-Service (PaaS) solution designed for on-premise or private cloud 
deployments.

The logging auth proxy is a reverse proxy that authenticates requests
against OpenShift, retrieving user information and setting the configured
header with the appropriate details.

Security Fix(es):

* A regular expression denial of service flaw was found in Negotiator. An
attacker able to make an application using Negotiator to perform matching
using a specially crafted glob pattern could cause the application to
consume an excessive amount of CPU. (CVE-2016-1000022)

* A regular expression denial of service flaw was found in Minimatch. An
attacker able to make an application using Minimatch to perform matching
using a specially crafted glob pattern could cause the application to
consume an excessive amount of CPU. (CVE-2016-1000023)

Refer to the changelog listed in the References section for a list of 
changes.

This update includes the following images:

openshift3/logging-auth-proxy:3.1.1-13
openshift3/logging-auth-proxy:3.2.1-5

All OpenShift Enterprise 3 users are advised to upgrade to the updated 
images.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1347677 - CVE-2016-1000022 nodejs-negotiator: Regular expression denial-of-service
1348509 - CVE-2016-1000023 nodejs-minimatch: Regular expression denial-of-service

6. Package List:

Red Hat OpenShift Enterprise 3.1:

Source:
nodejs-accepts-1.3.3-1.el7.src.rpm
nodejs-express-4.13.3-4.el7.src.rpm
nodejs-mime-db-1.23.0-1.el7.src.rpm
nodejs-mime-types-2.1.11-1.el7.src.rpm
nodejs-minimatch-3.0.2-1.el7.src.rpm
nodejs-negotiator-0.6.1-1.el7.src.rpm

noarch:
nodejs-accepts-1.3.3-1.el7.noarch.rpm
nodejs-express-4.13.3-4.el7.noarch.rpm
nodejs-mime-db-1.23.0-1.el7.noarch.rpm
nodejs-mime-types-2.1.11-1.el7.noarch.rpm
nodejs-minimatch-3.0.2-1.el7.noarch.rpm
nodejs-negotiator-0.6.1-1.el7.noarch.rpm

Red Hat OpenShift Enterprise 3.2:

Source:
nodejs-accepts-1.3.3-1.el7.src.rpm
nodejs-express-4.13.3-4.el7.src.rpm
nodejs-mime-db-1.23.0-1.el7.src.rpm
nodejs-mime-types-2.1.11-1.el7.src.rpm
nodejs-minimatch-3.0.2-1.el7.src.rpm
nodejs-negotiator-0.6.1-1.el7.src.rpm

noarch:
nodejs-accepts-1.3.3-1.el7.noarch.rpm
nodejs-express-4.13.3-4.el7.noarch.rpm
nodejs-mime-db-1.23.0-1.el7.noarch.rpm
nodejs-mime-types-2.1.11-1.el7.noarch.rpm
nodejs-minimatch-3.0.2-1.el7.noarch.rpm
nodejs-negotiator-0.6.1-1.el7.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-1000022
https://access.redhat.com/security/cve/CVE-2016-1000023
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXrLXGXlSAg2UNWIIRArocAJ9+WgzNssjwe83oaonRElAC53IdhACgxRui
HZIq2cFtWbY2vNuXqE4rnNo=8+17
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

RedHat: RHSA-2016-1605:01 Moderate: Red Hat OpenShift Enterprise security

An update is now available for Red Hat OpenShift Enterprise 3.1 and Red Hat OpenShift Enterprise 3.2

Summary

OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.
The logging auth proxy is a reverse proxy that authenticates requests against OpenShift, retrieving user information and setting the configured header with the appropriate details.
Security Fix(es):
* A regular expression denial of service flaw was found in Negotiator. An attacker able to make an application using Negotiator to perform matching using a specially crafted glob pattern could cause the application to consume an excessive amount of CPU. (CVE-2016-1000022)
* A regular expression denial of service flaw was found in Minimatch. An attacker able to make an application using Minimatch to perform matching using a specially crafted glob pattern could cause the application to consume an excessive amount of CPU. (CVE-2016-1000023)
Refer to the changelog listed in the References section for a list of changes.
This update includes the following images:
openshift3/logging-auth-proxy:3.1.1-13 openshift3/logging-auth-proxy:3.2.1-5
All OpenShift Enterprise 3 users are advised to upgrade to the updated images.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2016-1000022 https://access.redhat.com/security/cve/CVE-2016-1000023 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenShift Enterprise 3.1:
Source: nodejs-accepts-1.3.3-1.el7.src.rpm nodejs-express-4.13.3-4.el7.src.rpm nodejs-mime-db-1.23.0-1.el7.src.rpm nodejs-mime-types-2.1.11-1.el7.src.rpm nodejs-minimatch-3.0.2-1.el7.src.rpm nodejs-negotiator-0.6.1-1.el7.src.rpm
noarch: nodejs-accepts-1.3.3-1.el7.noarch.rpm nodejs-express-4.13.3-4.el7.noarch.rpm nodejs-mime-db-1.23.0-1.el7.noarch.rpm nodejs-mime-types-2.1.11-1.el7.noarch.rpm nodejs-minimatch-3.0.2-1.el7.noarch.rpm nodejs-negotiator-0.6.1-1.el7.noarch.rpm
Red Hat OpenShift Enterprise 3.2:
Source: nodejs-accepts-1.3.3-1.el7.src.rpm nodejs-express-4.13.3-4.el7.src.rpm nodejs-mime-db-1.23.0-1.el7.src.rpm nodejs-mime-types-2.1.11-1.el7.src.rpm nodejs-minimatch-3.0.2-1.el7.src.rpm nodejs-negotiator-0.6.1-1.el7.src.rpm
noarch: nodejs-accepts-1.3.3-1.el7.noarch.rpm nodejs-express-4.13.3-4.el7.noarch.rpm nodejs-mime-db-1.23.0-1.el7.noarch.rpm nodejs-mime-types-2.1.11-1.el7.noarch.rpm nodejs-minimatch-3.0.2-1.el7.noarch.rpm nodejs-negotiator-0.6.1-1.el7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2016:1605-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2016:1605
Issued Date: : 2016-08-11
CVE Names: CVE-2016-1000022 CVE-2016-1000023

Topic

An update is now available for Red Hat OpenShift Enterprise 3.1 and Red HatOpenShift Enterprise 3.2.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenShift Enterprise 3.1 - noarch

Red Hat OpenShift Enterprise 3.2 - noarch


Bugs Fixed

1347677 - CVE-2016-1000022 nodejs-negotiator: Regular expression denial-of-service

1348509 - CVE-2016-1000023 nodejs-minimatch: Regular expression denial-of-service


Related News