{
  "threat_severity" : "Moderate",
  "public_date" : "2020-02-12T23:00:00Z",
  "bugzilla" : {
    "description" : "openstack-selinux: policy flaw allows dbus messaging",
    "id" : "1789640",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1789640"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-285",
  "details" : [ "An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or more Red Hat OpenStack (RHOSP) containers could send messages to the dbus. With access to the dbus, the attacker could start or stop services, possibly causing a denial of service. Versions before openstack-selinux 0.8.24 are affected.", "An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or more Red Hat OpenStack (RHOSP) containers could send messages to the dbus. With access to the dbus, the attacker could start or stop services, possibly causing a denial of service." ],
  "statement" : "In Red Hat OpenStack Platform 15, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP openstack-selinux package.",
  "acknowledgement" : "This issue was discovered by Cedric Jeanneret (Red Hat).",
  "affected_release" : [ {
    "product_name" : "Red Hat OpenStack Platform 16.1",
    "release_date" : "2020-10-28T00:00:00Z",
    "advisory" : "RHSA-2020:4381",
    "cpe" : "cpe:/a:redhat:openstack:16.1::el8",
    "package" : "openstack-selinux-0:0.8.24-1.20200914163011.26243bf.el8ost"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenStack Platform 10 (Newton)",
    "fix_state" : "Not affected",
    "package_name" : "openstack-selinux",
    "cpe" : "cpe:/a:redhat:openstack:10"
  }, {
    "product_name" : "Red Hat OpenStack Platform 13 (Queens)",
    "fix_state" : "Not affected",
    "package_name" : "openstack-selinux",
    "cpe" : "cpe:/a:redhat:openstack:13"
  }, {
    "product_name" : "Red Hat OpenStack Platform 15 (Stein)",
    "fix_state" : "Will not fix",
    "package_name" : "openstack-selinux",
    "cpe" : "cpe:/a:redhat:openstack:15"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-1690\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-1690" ],
  "name" : "CVE-2020-1690",
  "mitigation" : {
    "value" : "There is no known mitigation for this issue, the flaw can only be resolved by applying updates.",
    "lang" : "en:us"
  },
  "csaw" : false
}