Bug 1316127 (CVE-2016-2160)

Summary: CVE-2016-2160 Privilege escalation when changing root password in sti builder image
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bleanhar, ccoleman, dmcphers, jechoi, jialiu, jkeck, jokerman, khong, kseifried, lmeyer, mmccomas, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A flaw was found in the building of containers within OpenShift Enterprise. An attacker could submit an image for building that executes commands within the container as root, allowing them to potentially escalate privileges.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-05-12 16:47:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1315187, 1315188    
Bug Blocks: 1316129, 1326106, 1326107    

Description Adam Mariš 2016-03-09 13:29:26 UTC
It was reported that by creating a new image with root password changed and using it as a sti builder image, attackers are able to gain ROOT in it. Overridding builder image scripts(e.g. assemble) can help the attackers to access the pod and/or perform remote command execution in it.

Product bugs (contain reproducer):

https://bugzilla.redhat.com/show_bug.cgi?id=1315187
https://bugzilla.redhat.com/show_bug.cgi?id=1315188

Upstream bug:

https://github.com/openshift/origin/pull/7864

Comment 1 errata-xmlrpc 2016-05-12 16:32:00 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Enterprise 3.2

Via RHSA-2016:1064 https://access.redhat.com/errata/RHSA-2016:1064