A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
access.redhat.com/errata/RHSA-2023:4701
access.redhat.com/errata/RHSA-2023:4702
access.redhat.com/errata/RHSA-2023:4703
access.redhat.com/errata/RHSA-2023:4704
access.redhat.com/errata/RHSA-2023:4705
access.redhat.com/errata/RHSA-2023:4706
access.redhat.com/errata/RHSA-2023:4707
access.redhat.com/errata/RHSA-2023:4708
access.redhat.com/security/cve/CVE-2023-3899
bugzilla.redhat.com/show_bug.cgi?id=2225407
lists.fedoraproject.org/archives/list/[email protected]/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/
lists.fedoraproject.org/archives/list/[email protected]/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/