-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenStack Platform 16.2 (openstack-barbican) security update Advisory ID: RHSA-2022:5114-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2022:5114 Issue date: 2022-06-22 CVE Names: CVE-2022-23451 CVE-2022-23452 ==================================================================== 1. Summary: An update for openstack-barbican is now available for Red Hat OpenStack Platform 16.2.3 (Train). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 16.2 - noarch 3. Description: Barbican is a ReST API designed for the secure storage, provisioning and management of secrets, including in OpenStack environments. Security Fix(es): * Barbican allows authenticated users to add/modify/delete arbitrary metadata on any secret (CVE-2022-23451) * Barbican allows authenticated role to add secrets to a different project's containers (CVE-2022-23452) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2025089 - CVE-2022-23451 openstack-barbican: Barbican allows authenticated users to add/modify/delete arbitrary metadata on any secret 2025090 - CVE-2022-23452 openstack-barbican: Barbican allows anyone with an admin role to add their secrets to a different project's containers 6. Package List: Red Hat OpenStack Platform 16.2: Source: openstack-barbican-9.0.2-2.20220122185348.c718783.el8ost.src.rpm noarch: openstack-barbican-9.0.2-2.20220122185348.c718783.el8ost.noarch.rpm openstack-barbican-api-9.0.2-2.20220122185348.c718783.el8ost.noarch.rpm openstack-barbican-common-9.0.2-2.20220122185348.c718783.el8ost.noarch.rpm openstack-barbican-keystone-listener-9.0.2-2.20220122185348.c718783.el8ost.noarch.rpm openstack-barbican-worker-9.0.2-2.20220122185348.c718783.el8ost.noarch.rpm python3-barbican-9.0.2-2.20220122185348.c718783.el8ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-23451 https://access.redhat.com/security/cve/CVE-2022-23452 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYrNY8NzjgjWX9erEAQjjKg//W3+O0XqrhoPgi6OpIj3qG1Hhk3UoVwKq D9JWTsZSXsfrbsSB3gs0vtta60LqR4wY6uNZDqMsu0qbUmJfvsO2yH8Hc5LHu7+P OKHge9q88kpmpHQX9X8MAi/4gRbIxL8eXCe1hKqRmryGdUWkAn9YMfFspkFUlXyn Gm3oWoM6IPg6E4wErNmCRhbABAbybtB9I/l4pSX7HedBQVmATb5ah3pun6wbrbk6 UdRYi9RXrBkj+66bmnf0oYcvuvuGDIsfaSzTcaE0LkcEmmMqAFKrVuPR83Bs2e9J Y54rCqbKiIGTM33hXCgFDpqqn/6Tm156WPeSHM1zgkaMC23DDcRxVWF7QZ0rA46k l4MpLQtpJLFTzsP0aIsmWX9ffJfdBuD7mucZ+pLUSoEerO0o4vm5PXvLxzDkBXIo 24SoTba0a+rkFfvdOZq29lI7jr4yzGscGLCxE/WwQG1x/8K34cPQphfZZY1XxN32 vhR1MnhkT3oA2C4/Yi7gyoPA3RvSFjw7Q66BX6MReMUakr1kNaCRt6hjtQdFts2k 4oIZv7lElqzt+2A1+lMjBLmhG/VcvSYyzYW5BrdNfkA0NqYAHS9pYjCc+tE9he7d OKdT7PMPBYDc7EdrjOeRtjMRvrj5fS3+JIp99x13rhU3alZ6hXvYF8fFsK9977HJ e14Ajt02u0Y=ydfs -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce