Bug 1397987 (CVE-2016-8651)

Summary: CVE-2016-8651 OpenShift Enterprise 3: Pulling of any image is possible with it manifest
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bleanhar, ccoleman, dedgar, dmcphers, jgoulding, jialiu, jkeck, joelsmith, jokerman, kseifried, lmeyer, mmccomas, sdodson, security-response-team, tdawson
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
An input validation flaw was found in the way OpenShift handles requests for images. A user, with a copy of the manifest associated with an image, can pull an image even if they do not have access to the image normally, resulting in the disclosure of any information contained within the image.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-12-14 17:00:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1388018, 1397989, 1397990, 1397991    
Bug Blocks: 1388979    

Description Kurt Seifried 2016-11-23 18:13:25 UTC
It is reported that given the manifest data for a container that is not owned by a user that user will still be able to pull the container and access the contents of it.

Comment 2 errata-xmlrpc 2016-12-07 20:58:55 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Enterprise 3.1
  Red Hat OpenShift Enterprise 3.2
  Red Hat OpenShift Container Platform 3.3

Via RHSA-2016:2915 https://access.redhat.com/errata/RHSA-2016:2915