On Tue, Feb 23, 2021 at 02:52:22AM +0000, wangyunjian wrote:
> non-root users can use ovs-vsctl, but the following security problems may 
> exist. Because /usr/share/openvswitch/scripts/ovs-ctl will call ovs-appctl, 
> ovs-vsctl etc., and ovs-ctl is called by the OVS service as root. In this 
> case, the following paths of attack exist:
> 1. non-root user tamper with the contents of ovs-vsctl to execute arbitrary 
> bash commands, such as `reboot`;
> 2. When the ovs-ctl script is called by the OVS service as root, the 
> ovs-vsctl command will be executed, and then the reboot is triggered. 
> Originally, non-root users are not entitled to execute reboot, but through 
> this attack can be successfully executed, there is a risk of raising 
> privilege.

I'd generally consider a scenario like the above to be a bug in
ovs-ctl.  Do you have a specific vulnerability to report?
_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to