CVE-2020-1690

An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or more Red Hat OpenStack (RHOSP) containers could send messages to the dbus. With access to the dbus, the attacker could start or stop services, possibly causing a denial of service. Versions before openstack-selinux 0.8.24 are affected.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1789640 Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1789640 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:openstack-selinux:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack_platform:15.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*

History

21 Nov 2024, 05:11

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1789640 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1789640 - Issue Tracking, Vendor Advisory

Information

Published : 2021-06-07 20:15

Updated : 2024-11-21 05:11


NVD link : CVE-2020-1690

Mitre link : CVE-2020-1690

CVE.ORG link : CVE-2020-1690


JSON object : View

Products Affected

redhat

  • openstack_platform
  • openstack-selinux
CWE
CWE-285

Improper Authorization

NVD-CWE-Other