An updated rubygem-openshift-origin-node package that fixes one securityissue and several bugs is now available for Red Hat OpenShift Enterprise 2.1.1.The Red Hat Security Response Team has rated this update as having Criticalsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available from the CVE link inthe References section.

The rubygem-openshift-origin-node package provides basic OpenShift nodefunctionality.A command injection flaw was found in rubygem-openshift-origin-node.A remote, authenticated user permitted to install cartridges via the webinterface could use this flaw to execute arbitrary code with rootprivileges on the Red Hat OpenShift Enterprise node server. (CVE-2014-3496)This issue was discovered by Jeremy Choi of the Red Hat HSS Pen-test Team.The rubygem-openshift-origin-node package has been upgraded to version1.23.9.11. Additionally, the rubygem-openshift-origin-container-selinuxpackage has been upgraded to version, as needed by the updatedrubygem-openshift-origin-node package.This update also fixes the following bugs:* The syslog_logger.rb implementation on nodes made incorrect use of the Ruby Syslog library. Raw log message input was handled as a Syslog format string, causing failures for many application operations. This bug fix updates the implementation to correctly handle raw log message input, and the failures no longer occur. (BZ#1096900)* Under certain conditions, it was possible for the MCollective agent on nodes to fail to fully initialize while checking the status of a cartridge. This resulted in sporadic failures of rhc cartridge status. This bug fix ensures that the agent is always fully initialized. (BZ#1102399)* Developers encountered syntax errors when connecting to a gear using the’rhc ssh’ command if the gear was hosted on a node with quotas disabled.This was due to the command trying to report quota information but beinggiven an empty string because quotas were disabled. This bug fix updatesthe handling for reporting on quotas when there is no information toreport, and the syntax errors no longer occur. (BZ#1107801)* If a file containing invalid special characters was placed in anapplication’s ~/.env/user_vars directory, subsequent interactions with theapplication using SSH or Git were refused. This was due to problems withthe node component handling the invalid characters. This bug fix updatesthe node component to handle problematic files in ~/.env/user_vars; as aresult, interactions with the application using SSH or Git succeed asnormal. (BZ#1096833)All rubygem-openshift-origin-node users are advised to upgrade to thisupdated package, which contains a backported patch to correct this issue.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available at
1096833 – Errors in user_vars/* files block ssh access, git access1096900 – Log messages are being interpolated by syslog_logger.rb, causing random app operation failures1102399 – [new relic] undefined method `run_in_container_context’ for nil:NilClass on INT nodes1107801 – rhcsh quota check prints error messages on login if quotas are disabled1110470 – CVE-2014-3496 OpenShift Origin: Command execution as root via downloadable cartridge source-url

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply