CVE-2020-1690

An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or more Red Hat OpenStack (RHOSP) containers could send messages to the dbus. With access to the dbus, the attacker could start or stop services, possibly causing a denial of service. Versions before openstack-selinux 0.8.24 are affected.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1789640 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:openstack-selinux:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openstack_platform:15.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-06-07 20:15

Updated : 2024-02-28 18:28


NVD link : CVE-2020-1690

Mitre link : CVE-2020-1690

CVE.ORG link : CVE-2020-1690


JSON object : View

Products Affected

redhat

  • openstack_platform
  • openstack-selinux
CWE
NVD-CWE-Other CWE-285

Improper Authorization