Bug 2167337 (CVE-2020-16250)
Summary: | CVE-2020-16250 vault: Hashicorp Vault AWS IAM Integration Authentication Bypass | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Avinash Hanwate <ahanwate> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | amctagga, anbehl, aoconnor, dfreiber, jburrell, jcantril, kaycoth, muagarwa, napaul, nbecker, nobody, ocs-bugs, periklis, rogbas, tnielsen, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | vault 1.2.5, vault 1.3.8, vault 1.4.4, vault 1.5.1 | Doc Type: | --- |
Doc Text: |
A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM identities and roles may be manipulated and bypass authentication.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-06-23 01:42:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2168894, 2167352, 2167353, 2167356, 2167358, 2167360, 2167361, 2167362 | ||
Bug Blocks: | 2167338 |
Description
Avinash Hanwate
2023-02-06 10:36:34 UTC
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2023:3342 https://access.redhat.com/errata/RHSA-2023:3342 This issue has been addressed in the following products: RHODF-4.13-RHEL-9 Via RHSA-2023:3742 https://access.redhat.com/errata/RHSA-2023:3742 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-16250 |