Summary: | CVE-2016-8651 OpenShift Enterprise 3: Pulling of any image is possible with it manifest | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bleanhar, ccoleman, dedgar, dmcphers, jgoulding, jialiu, jkeck, joelsmith, jokerman, kseifried, lmeyer, mmccomas, sdodson, security-response-team, tdawson |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An input validation flaw was found in the way OpenShift handles requests for images. A user, with a copy of the manifest associated with an image, can pull an image even if they do not have access to the image normally, resulting in the disclosure of any information contained within the image.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-12-14 17:00:21 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | Embargoed1388018, Red Hat1397989, Red Hat1397990, Red Hat1397991 | ||
Bug Blocks: | Embargoed1388979 |
Description
Kurt Seifried
2016-11-23 18:13:25 UTC
This issue has been addressed in the following products: Red Hat OpenShift Enterprise 3.1 Red Hat OpenShift Enterprise 3.2 Red Hat OpenShift Container Platform 3.3 Via RHSA-2016:2915 https://access.redhat.com/errata/RHSA-2016:2915 |