-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5247-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 04, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : barbican CVE ID : CVE-2022-3100 Debian Bug : 1021139 Douglas Mendizabal discovered that Barbican, the OpenStack Key Management Service, incorrectly parsed requests which could allow an authenticated user to bypass Barbican access policies. For the stable distribution (bullseye), this problem has been fixed in version 1:11.0.0-3+deb11u1. We recommend that you upgrade your barbican packages. For the detailed security status of barbican please refer to its security tracker page at: https://security-tracker.debian.org/tracker/barbican Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmM8g28ACgkQEMKTtsN8 TjazZRAAgQDNXOSVNcy2ZkIpXjw7LOp3SN3hVMIzhGURQKpsbHivgvSEHdRJbGRR E9gJDfavAAWpiOzOE9yK3w0w2EW+CbNnGC+OrIySqwvaWRj9kwkuoQUJj8gcrdV3 UD0pEZSaDRlhy42oXSGgd/OcjQYSHa3tOI+D1Q2EVc834dTUZWlU/opd5ZgidiHE YxJpSFW1kOHR1ZKAb3kduKF5G/n1ErdAcfvpDKITuaiPoXFI7s8a9lnGs+0Y+HcG 3c6ODUNe2FF+w+nihaDHpXnW2wBm8TYKcXGxkvDbZauAgLnVCCveUkgKqkBRXXn0 s6N1UvG0HuDpkYeksf7McC1/dKBkL+mDUo9Xauf6xXkzNdP43Ldhf+ujs5G/2BKm BrWCtKAKkhL39CrfOrPKzRb2X//CnKFTipR35HBJ62eheGyPkOgn0wgppY1ep9ao GyCHKkD51MkcPJ6ukIu9nlHjFEBqwAxYJ+mLzZRozgSBJnDeuWaHgdXIItMsfAJT gkVVpZICAWlBOJB9EbCgPUzdsR8yP5aHKuAUvAfbhLGuwLIvMhRja6Qe9hOkrgIW V4BTZwIjQMfdluo0ioYdqymRX0L83JXZDCgcnKelF5HRmJlU/KrDnhfS7scYJx1Z IiRx9HQ3L6Ftd3wmNbvpCB3hw05hk2u+E7la1lXVEJYYTG/POXk= =mpgp -----END PGP SIGNATURE-----