Bug 1316127 - (CVE-2016-2160) CVE-2016-2160 Privilege escalation when changing root password in sti builder image
CVE-2016-2160 Privilege escalation when changing root password in sti builder...
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1315187 1315188
Blocks: 1316129 1326106 1326107
  Show dependency treegraph
Reported: 2016-03-09 08:29 EST by Adam Mariš
Modified: 2016-05-12 12:47 EDT (History)
12 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the building of containers within OpenShift Enterprise. An attacker could submit an image for building that executes commands within the container as root, allowing them to potentially escalate privileges.
Story Points: ---
Clone Of:
Last Closed: 2016-05-12 12:47:18 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-03-09 08:29:26 EST
It was reported that by creating a new image with root password changed and using it as a sti builder image, attackers are able to gain ROOT in it. Overridding builder image scripts(e.g. assemble) can help the attackers to access the pod and/or perform remote command execution in it.

Product bugs (contain reproducer):


Upstream bug:

Comment 1 errata-xmlrpc 2016-05-12 12:32:00 EDT
This issue has been addressed in the following products:

  Red Hat OpenShift Enterprise 3.2

Via RHSA-2016:1064 https://access.redhat.com/errata/RHSA-2016:1064

Note You need to log in before you can comment on or make changes to this bug.