An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or more Red Hat OpenStack (RHOSP) containers could send messages to the dbus. With access to the dbus, the attacker could start or stop services, possibly causing a denial of service. Versions before openstack-selinux 0.8.24 are affected.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1789640 | Issue Tracking Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1789640 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1789640 - Issue Tracking, Vendor Advisory |
Information
Published : 2021-06-07 20:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1690
Mitre link : CVE-2020-1690
CVE.ORG link : CVE-2020-1690
JSON object : View
Products Affected
redhat
- openstack_platform
- openstack-selinux
CWE