{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T16:08:27.619","vulnerabilities":[{"cve":{"id":"CVE-2016-9592","sourceIdentifier":"secalert@redhat.com","published":"2018-04-16T15:29:00.233","lastModified":"2024-11-21T03:01:28.290","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"openshift before versions 3.3.1.11, 3.2.1.23, 3.4 is vulnerable to a flaw when a volume fails to detach, which causes the delete operation to fail with 'VolumeInUse' error. Since the delete operation is retried every 30 seconds for each volume, this could lead to a denial of service attack as the number of API requests being sent to the cloud-provider exceeds the API's rate-limit."},{"lang":"es","value":"openshift, en versiones anteriores a la 3.3.1.11, 3.2.1.23 y 3.4, es vulnerable a un error cuando un volumen fracasa a la hora de desasociarse. Esto provoca que la operación de borrado falle con un error \"VolumeInUse\". Como la operación de borrado se reintenta cada 30 segundos para cada volumen, esto podría conducir a un ataque de denegación de servicio (DoS), ya que el número de peticiones API que se envían al proveedor cloud excede el límite de tasa de la API."}],"metrics":{"cvssMetricV30":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-460"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift:3.2.1.23:*:*:*:enterprise:*:*:*","matchCriteriaId":"2325EB46-F017-4D89-8436-1BDB75AC4007"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift:3.3.1.11:*:*:*:enterprise:*:*:*","matchCriteriaId":"401352A3-D572-4E6D-91DF-3CD131825BE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift:3.4:*:*:*:enterprise:*:*:*","matchCriteriaId":"E1056A33-690E-4120-821F-52B9705CB84B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/94991","source":"secalert@redhat.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9592","source":"secalert@redhat.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/94991","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9592","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]}]}}]}