First published: Mon Jul 16 2018(Updated: )
The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | ||
Red Hat OpenShift Container Platform | =3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15137 has a medium severity rating due to its potential to allow unauthorized image running in OpenShift.
To fix CVE-2017-15137, apply the latest security updates for Red Hat OpenShift and OpenShift Container Platform.
CVE-2017-15137 affects all versions of Red Hat OpenShift and specifically the Red Hat OpenShift Container Platform version 3.9.
If CVE-2017-15137 is not addressed, unauthorized users could potentially run untrusted images from restricted registries.
Users with access to OpenShift environments are at risk from CVE-2017-15137 due to the improper enforcement of image import restrictions.