Security update for openstack-barbican
Announcement ID: | SUSE-SU-2023:0071-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability can now be installed.
Description:
This update for openstack-barbican contains the following fix:
Security fix included on this update: openstack-barbican:
- CVE-2022-3100: Fixed an access policy bypass via query string injection (bsc#1203873).
Update for openstack-barbican: - Add patch for CVE-2022-3100 to address access policy bypass via query string injection. (bsc#1203873, CVE-2022-3100)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
HPE Helion OpenStack 8
zypper in -t patch HPE-Helion-OpenStack-8-2023-71=1
-
SUSE OpenStack Cloud 8
zypper in -t patch SUSE-OpenStack-Cloud-8-2023-71=1
-
SUSE OpenStack Cloud Crowbar 8
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2023-71=1
Package List:
-
HPE Helion OpenStack 8 (noarch)
- openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2
- openstack-barbican-doc-5.0.2~dev3-3.17.2
- openstack-barbican-api-5.0.2~dev3-3.17.2
- openstack-barbican-5.0.2~dev3-3.17.2
- python-barbican-5.0.2~dev3-3.17.2
- openstack-barbican-worker-5.0.2~dev3-3.17.2
- openstack-barbican-retry-5.0.2~dev3-3.17.2
- venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2
-
SUSE OpenStack Cloud 8 (noarch)
- openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2
- openstack-barbican-doc-5.0.2~dev3-3.17.2
- openstack-barbican-api-5.0.2~dev3-3.17.2
- openstack-barbican-5.0.2~dev3-3.17.2
- python-barbican-5.0.2~dev3-3.17.2
- openstack-barbican-worker-5.0.2~dev3-3.17.2
- openstack-barbican-retry-5.0.2~dev3-3.17.2
- venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2
-
SUSE OpenStack Cloud Crowbar 8 (noarch)
- openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2
- openstack-barbican-doc-5.0.2~dev3-3.17.2
- openstack-barbican-api-5.0.2~dev3-3.17.2
- openstack-barbican-5.0.2~dev3-3.17.2
- python-barbican-5.0.2~dev3-3.17.2
- openstack-barbican-worker-5.0.2~dev3-3.17.2
- openstack-barbican-retry-5.0.2~dev3-3.17.2