{"id":"RHSA-2016:0489","summary":"Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.9 security, bug fix, and enhancement update","modified":"2026-02-19T10:01:46Z","published":"2024-09-15T23:07:38Z","upstream":["CVE-2015-5254","CVE-2015-5317","CVE-2015-5318","CVE-2015-5319","CVE-2015-5320","CVE-2015-5321","CVE-2015-5322","CVE-2015-5323","CVE-2015-5324","CVE-2015-5325","CVE-2015-5326","CVE-2015-7537","CVE-2015-7538","CVE-2015-7539","CVE-2015-8103"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:0489"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1111456"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1140816"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1160934"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168480"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265811"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1279584"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282359"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282362"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282363"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282364"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282365"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282366"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282367"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282368"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282369"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1282371"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1283372"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291292"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291797"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291798"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1294513"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299014"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1299095"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1305688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1307174"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1307175"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1308716"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1308718"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1308720"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1308722"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1308739"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310266"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310841"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314535"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1314546"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0489.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5254"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5254"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5254"},{"type":"ARTICLE","url":"http://activemq.apache.org/security-advisories.data/CVE-2015-5254-announcement.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5317"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5317"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5317"},{"type":"ARTICLE","url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5318"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5318"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5318"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5319"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5319"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5319"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5320"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5320"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5320"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5321"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5321"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5321"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5322"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5323"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5323"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5323"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5324"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5324"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5324"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5325"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5326"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5326"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5326"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-7537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-7537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7537"},{"type":"ARTICLE","url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-12-09"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-7538"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-7538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-7539"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-7539"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7539"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8103"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8103"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8103"}],"affected":[{"package":{"name":"rhc","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/rhc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.38.6.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"activemq","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/activemq"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.9.0-6.redhat.611454.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"activemq-client","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/activemq-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.9.0-6.redhat.611454.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-enterprise-release","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-enterprise-release"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.9-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-enterprise-upgrade","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-enterprise-upgrade"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.9-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-enterprise-upgrade-broker","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-enterprise-upgrade-broker"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.9-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-enterprise-upgrade-node","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-enterprise-upgrade-node"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.9-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-enterprise-yum-validator","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-enterprise-yum-validator"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.9-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-broker-util","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-broker-util"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.37.5.3-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"rubygem-openshift-origin-common","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/rubygem-openshift-origin-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.29.5.2-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"rubygem-openshift-origin-console","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/rubygem-openshift-origin-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.35.5.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"rubygem-openshift-origin-controller","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/rubygem-openshift-origin-controller"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.38.5.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"jenkins","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.625.3-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-cartridge-cron","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-cartridge-cron"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.25.2.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-cartridge-haproxy","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-cartridge-haproxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.31.5.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-cartridge-mysql","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-cartridge-mysql"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.31.2.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-cartridge-php","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-cartridge-php"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.35.3.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-cartridge-python","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-cartridge-python"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.34.2.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-msg-node-mcollective","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-msg-node-mcollective"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.30.2.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-node-proxy","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-node-proxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.26.2.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"openshift-origin-node-util","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/openshift-origin-node-util"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.38.6.2-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-bcmath","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-bcmath"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-debuginfo","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-devel","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-fpm","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-fpm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-imap","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-imap"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-intl","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-intl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-mbstring","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-mbstring"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"php-process","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/php-process"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.3.3-46.el6_7.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"rubygem-openshift-origin-frontend-apache-vhost","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/rubygem-openshift-origin-frontend-apache-vhost"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.13.2.1-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}},{"package":{"name":"rubygem-openshift-origin-node","ecosystem":"Red Hat:openshift:2.0::el6","purl":"pkg:rpm/redhat/rubygem-openshift-origin-node"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.38.5.3-1.el6op"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0489.json"}}],"schema_version":"1.7.3"}