Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-3100 (GCVE-0-2022-3100)
Vulnerability from cvelistv5
Published
2023-01-18 00:00
Modified
2025-04-03 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Red Hat OpenStack Platform |
Version: 13.0-17.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-3100", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-02T17:55:00.610784Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T19:26:10.275Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Red Hat OpenStack Platform", "vendor": "n/a", "versions": [ { "status": "affected", "version": "13.0-17.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-18T00:00:00.000Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-3100", "datePublished": "2023-01-18T00:00:00.000Z", "dateReserved": "2022-09-02T00:00:00.000Z", "dateUpdated": "2025-04-03T19:26:10.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-3100\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-01-18T17:15:10.173\",\"lastModified\":\"2025-04-03T20:15:17.363\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en el componente openstack-barbican. Este problema permite omitir la pol\u00edtica de acceso a trav\u00e9s de una cadena de consulta al acceder a la API.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":4.2},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-305\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:barbican:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596EFC6C-4D91-4EDF-9EC6-1C58EB485C5E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:*\",\"matchCriteriaId\":\"BC52495A-0275-4FC5-869B-7137E7FE115E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D3F4FF-AD3D-4D17-93E8-84CAFCED2F59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE398FE-EE7C-4B64-ABB6-24697E047C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC12AF01-CCDD-4AB6-8F44-32058A63BAFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_for_ibm_power:13:*:*:*:els:*:*:*\",\"matchCriteriaId\":\"1669C672-84CB-46D7-802A-4489749C8821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D272E454-64F0-4BD2-9EE8-B2A48023758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DD273B9-4536-42E5-9F90-52408D263B22\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52600BF-9E87-4CD2-91F3-685AFE478C1E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-3100\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-3100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2022-3100\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:00:10.491Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-3100\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-02T17:55:00.610784Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-02T17:55:57.886Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Red Hat OpenStack Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"13.0-17.0\"}]}], \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2022-3100\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-305\", \"description\": \"CWE-305\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2023-01-18T00:00:00.000Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-3100\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-03T19:26:10.275Z\", \"dateReserved\": \"2022-09-02T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2023-01-18T00:00:00.000Z\", \"assignerShortName\": \"redhat\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
suse-su-2023:0070-1
Vulnerability from csaf_suse
Published
2023-01-11 14:40
Modified
2023-01-11 14:40
Summary
Security update for openstack-barbican, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-neutron, openstack-neutron-gbp
Notes
Title of the patch
Security update for openstack-barbican, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-neutron, openstack-neutron-gbp
Description of the patch
This update for openstack-barbican, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-neutron, openstack-neutron-gbp fixes the following issues:
Security fixes included on this update:
openstack-barbican:
- CVE-2022-3100: Fixed an access policy bypass via query string injection (bsc#1203873).
spark:
- CVE-2022-33891: Fixed a command injection vulnerability via Spark UI (bsc#1204326).
Non Security fixes:
Changes in openstack-barbican:
- Add patch to address access policy bypass via query string injection.
(bsc#1203873, CVE-2022-3100.)
Changes in openstack-heat-gbp:
- Update to version group-based-policy-automation-14.0.1.dev5:
* Add support for zed
Changes in openstack-horizon-plugin-gbp-ui:
- Update to version group-based-policy-ui-14.0.1.dev6:
* Add support for zed
- Update to version group-based-policy-ui-14.0.1.dev5:
* fix launch instance GBP issue
Changes in openstack-neutron:
- Update to version neutron-13.0.8.dev209:
* Update documentation link for openSUSE index
- Update to version neutron-13.0.8.dev208:
* fix: Fix url of Floodlight
- Update to version neutron-13.0.8.dev207:
* Mellanox\_eth.img url expires, remove the mellanox\_eth.img node
Changes in openstack-neutron:
- Update to version neutron-13.0.8.dev209:
* Update documentation link for openSUSE index
- Update to version neutron-13.0.8.dev208:
* fix: Fix url of Floodlight
- Update to version neutron-13.0.8.dev207:
* Mellanox\_eth.img url expires, remove the mellanox\_eth.img node
Changes in openstack-neutron-gbp:
- Update to version group-based-policy-14.0.1.dev52:
* Fix keystone notification listener
- Update to version group-based-policy-14.0.1.dev51:
* Support for epg subnet
2014.2.0rc1
- Update to version group-based-policy-14.0.1.dev50:
* Use top-level contract references
2014.2.rc1
- Update to version group-based-policy-14.0.1.dev48:
* Remove py37 jobs from gate
2014.2rc1
Changes in spark:
- Avoid using bash -c in ShellBasedGroupsMappingProvider. (bsc#1204326, CVE-2022-33891)
- Add _constraints to prevent build from running out of disk space
- Update to version group-based-policy-14.0.1.dev47:
* Remove python39 from voting
Patchnames
SUSE-2023-70,SUSE-OpenStack-Cloud-9-2023-70,SUSE-OpenStack-Cloud-Crowbar-9-2023-70
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openstack-barbican, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-neutron, openstack-neutron-gbp", "title": "Title of the patch" }, { "category": "description", "text": "This update for openstack-barbican, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-neutron, openstack-neutron-gbp fixes the following issues:\n\nSecurity fixes included on this update:\n\nopenstack-barbican:\n\n- CVE-2022-3100: Fixed an access policy bypass via query string injection (bsc#1203873).\n\nspark:\n\n- CVE-2022-33891: Fixed a command injection vulnerability via Spark UI (bsc#1204326).\n\n\nNon Security fixes:\n\nChanges in openstack-barbican:\n- Add patch to address access policy bypass via query string injection.\n (bsc#1203873, CVE-2022-3100.)\n\nChanges in openstack-heat-gbp:\n- Update to version group-based-policy-automation-14.0.1.dev5:\n * Add support for zed\n\nChanges in openstack-horizon-plugin-gbp-ui:\n- Update to version group-based-policy-ui-14.0.1.dev6:\n * Add support for zed\n\n- Update to version group-based-policy-ui-14.0.1.dev5:\n * fix launch instance GBP issue\n\nChanges in openstack-neutron:\n- Update to version neutron-13.0.8.dev209:\n * Update documentation link for openSUSE index\n\n- Update to version neutron-13.0.8.dev208:\n * fix: Fix url of Floodlight\n\n- Update to version neutron-13.0.8.dev207:\n * Mellanox\\_eth.img url expires, remove the mellanox\\_eth.img node\n\nChanges in openstack-neutron:\n- Update to version neutron-13.0.8.dev209:\n * Update documentation link for openSUSE index\n\n- Update to version neutron-13.0.8.dev208:\n * fix: Fix url of Floodlight\n\n- Update to version neutron-13.0.8.dev207:\n * Mellanox\\_eth.img url expires, remove the mellanox\\_eth.img node\n\nChanges in openstack-neutron-gbp:\n- Update to version group-based-policy-14.0.1.dev52:\n * Fix keystone notification listener\n\n- Update to version group-based-policy-14.0.1.dev51:\n * Support for epg subnet\n 2014.2.0rc1\n\n- Update to version group-based-policy-14.0.1.dev50:\n * Use top-level contract references\n 2014.2.rc1\n\n- Update to version group-based-policy-14.0.1.dev48:\n * Remove py37 jobs from gate\n 2014.2rc1\n\nChanges in spark:\n- Avoid using bash -c in ShellBasedGroupsMappingProvider. (bsc#1204326, CVE-2022-33891)\n\n- Add _constraints to prevent build from running out of disk space\n\n- Update to version group-based-policy-14.0.1.dev47:\n * Remove python39 from voting\n\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-70,SUSE-OpenStack-Cloud-9-2023-70,SUSE-OpenStack-Cloud-Crowbar-9-2023-70", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0070-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0070-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230070-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0070-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013456.html" }, { "category": "self", "summary": "SUSE Bug 1203873", "url": "https://bugzilla.suse.com/1203873" }, { "category": "self", "summary": "SUSE Bug 1204326", "url": "https://bugzilla.suse.com/1204326" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3100 page", "url": "https://www.suse.com/security/cve/CVE-2022-3100/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33891 page", "url": "https://www.suse.com/security/cve/CVE-2022-33891/" } ], "title": "Security update for openstack-barbican, openstack-heat-gbp, openstack-horizon-plugin-gbp-ui, openstack-neutron, openstack-neutron-gbp", "tracking": { "current_release_date": "2023-01-11T14:40:56Z", "generator": { "date": "2023-01-11T14:40:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0070-1", "initial_release_date": "2023-01-11T14:40:56Z", "revision_history": [ { "date": "2023-01-11T14:40:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openstack-barbican-7.0.1~dev24-3.17.1.noarch", "product": { "name": "openstack-barbican-7.0.1~dev24-3.17.1.noarch", "product_id": "openstack-barbican-7.0.1~dev24-3.17.1.noarch" } }, { "category": "product_version", "name": "openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "product": { "name": "openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "product_id": "openstack-barbican-api-7.0.1~dev24-3.17.1.noarch" } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "product": { "name": "openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "product_id": "openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch" } }, { "category": "product_version", "name": "openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "product": { "name": "openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "product_id": "openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch" } }, { "category": "product_version", "name": "openstack-barbican-test-7.0.1~dev24-3.17.1.noarch", "product": { "name": "openstack-barbican-test-7.0.1~dev24-3.17.1.noarch", "product_id": "openstack-barbican-test-7.0.1~dev24-3.17.1.noarch" } }, { "category": "product_version", "name": "openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "product": { "name": "openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "product_id": "openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch" } }, { "category": "product_version", "name": "openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "product": { "name": "openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "product_id": "openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch" } }, { "category": "product_version", "name": "openstack-heat-gbp-test-14.0.1~dev5-3.12.1.noarch", "product": { "name": "openstack-heat-gbp-test-14.0.1~dev5-3.12.1.noarch", "product_id": "openstack-heat-gbp-test-14.0.1~dev5-3.12.1.noarch" } }, { "category": "product_version", "name": "openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "product": { "name": "openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "product_id": "openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch" } }, { "category": "product_version", "name": "openstack-horizon-plugin-gbp-ui-test-14.0.1~dev6-3.15.1.noarch", "product": { "name": "openstack-horizon-plugin-gbp-ui-test-14.0.1~dev6-3.15.1.noarch", "product_id": "openstack-horizon-plugin-gbp-ui-test-14.0.1~dev6-3.15.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "product": { "name": "openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "product_id": "openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-gbp-test-14.0.1~dev52-3.37.1.noarch", "product": { "name": "openstack-neutron-gbp-test-14.0.1~dev52-3.37.1.noarch", "product_id": "openstack-neutron-gbp-test-14.0.1~dev52-3.37.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-server-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "openstack-neutron-test-13.0.8~dev209-3.43.1.noarch", "product": { "name": "openstack-neutron-test-13.0.8~dev209-3.43.1.noarch", "product_id": "openstack-neutron-test-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "python-barbican-7.0.1~dev24-3.17.1.noarch", "product": { "name": "python-barbican-7.0.1~dev24-3.17.1.noarch", "product_id": "python-barbican-7.0.1~dev24-3.17.1.noarch" } }, { "category": "product_version", "name": "python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "product": { "name": "python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "product_id": "python-heat-gbp-14.0.1~dev5-3.12.1.noarch" } }, { "category": "product_version", "name": "python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "product": { "name": "python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "product_id": "python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch" } }, { "category": "product_version", "name": "python-neutron-13.0.8~dev209-3.43.1.noarch", "product": { "name": "python-neutron-13.0.8~dev209-3.43.1.noarch", "product_id": "python-neutron-13.0.8~dev209-3.43.1.noarch" } }, { "category": "product_version", "name": "python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "product": { "name": "python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "product_id": "python-neutron-gbp-14.0.1~dev52-3.37.1.noarch" } }, { "category": "product_version", "name": "spark-2.2.3-5.12.1.noarch", "product": { "name": "spark-2.2.3-5.12.1.noarch", "product_id": "spark-2.2.3-5.12.1.noarch" } }, { "category": "product_version", "name": "venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "product": { "name": "venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "product_id": "venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch" } }, { "category": "product_version", "name": "venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "product": { "name": "venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "product_id": "venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch" } }, { "category": "product_version", "name": "venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "product": { "name": "venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "product_id": "venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch" } }, { "category": "product_version", "name": "venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "product": { "name": "venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "product_id": "venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch" }, "product_reference": "openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch" }, "product_reference": "openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch" }, "product_reference": "openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-server-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:python-barbican-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "python-barbican-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-heat-gbp-14.0.1~dev5-3.12.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch" }, "product_reference": "python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch" }, "product_reference": "python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-neutron-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:python-neutron-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "python-neutron-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-neutron-gbp-14.0.1~dev52-3.37.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch" }, "product_reference": "python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "spark-2.2.3-5.12.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:spark-2.2.3-5.12.1.noarch" }, "product_reference": "spark-2.2.3-5.12.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch" }, "product_reference": "venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch" }, "product_reference": "venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch" }, "product_reference": "venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch" }, "product_reference": "venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch" }, "product_reference": "openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch" }, "product_reference": "openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch" }, "product_reference": "openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-neutron-server-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-7.0.1~dev24-3.17.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:python-barbican-7.0.1~dev24-3.17.1.noarch" }, "product_reference": "python-barbican-7.0.1~dev24-3.17.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-heat-gbp-14.0.1~dev5-3.12.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch" }, "product_reference": "python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch" }, "product_reference": "python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-neutron-13.0.8~dev209-3.43.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:python-neutron-13.0.8~dev209-3.43.1.noarch" }, "product_reference": "python-neutron-13.0.8~dev209-3.43.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "python-neutron-gbp-14.0.1~dev52-3.37.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch" }, "product_reference": "python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "spark-2.2.3-5.12.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:spark-2.2.3-5.12.1.noarch" }, "product_reference": "spark-2.2.3-5.12.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3100", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3100" } ], "notes": [ { "category": "general", "text": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:spark-2.2.3-5.12.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:spark-2.2.3-5.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3100", "url": "https://www.suse.com/security/cve/CVE-2022-3100" }, { "category": "external", "summary": "SUSE Bug 1203873 for CVE-2022-3100", "url": "https://bugzilla.suse.com/1203873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:spark-2.2.3-5.12.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:spark-2.2.3-5.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:spark-2.2.3-5.12.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:spark-2.2.3-5.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-01-11T14:40:56Z", "details": "important" } ], "title": "CVE-2022-3100" }, { "cve": "CVE-2022-33891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33891" } ], "notes": [ { "category": "general", "text": "The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:spark-2.2.3-5.12.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:spark-2.2.3-5.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33891", "url": "https://www.suse.com/security/cve/CVE-2022-33891" }, { "category": "external", "summary": "SUSE Bug 1204326 for CVE-2022-33891", "url": "https://bugzilla.suse.com/1204326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:spark-2.2.3-5.12.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:spark-2.2.3-5.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE OpenStack Cloud 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud 9:spark-2.2.3-5.12.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-barbican-x86_64-7.0.1~dev24-3.37.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-horizon-x86_64-14.1.1~dev11-4.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-neutron-x86_64-13.0.8~dev209-6.43.1.noarch", "SUSE OpenStack Cloud 9:venv-openstack-nova-x86_64-18.3.1~dev92-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-api-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-keystone-listener-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-retry-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-barbican-worker-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-dhcp-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-ha-tool-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-l3-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-linuxbridge-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-macvtap-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metadata-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-metering-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-openvswitch-agent-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:openstack-neutron-server-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-barbican-7.0.1~dev24-3.17.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-heat-gbp-14.0.1~dev5-3.12.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-horizon-plugin-gbp-ui-14.0.1~dev6-3.15.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-13.0.8~dev209-3.43.1.noarch", "SUSE OpenStack Cloud Crowbar 9:python-neutron-gbp-14.0.1~dev52-3.37.1.noarch", "SUSE OpenStack Cloud Crowbar 9:spark-2.2.3-5.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-01-11T14:40:56Z", "details": "important" } ], "title": "CVE-2022-33891" } ] }
suse-su-2023:0071-1
Vulnerability from csaf_suse
Published
2023-01-11 14:41
Modified
2023-01-11 14:41
Summary
Security update for openstack-barbican
Notes
Title of the patch
Security update for openstack-barbican
Description of the patch
This update for openstack-barbican contains the following fix:
Security fix included on this update:
openstack-barbican:
- CVE-2022-3100: Fixed an access policy bypass via query string injection (bsc#1203873).
Update for openstack-barbican:
- Add patch for CVE-2022-3100 to address access policy bypass via query string injection. (bsc#1203873, CVE-2022-3100)
Patchnames
HPE-Helion-OpenStack-8-2023-71,SUSE-2023-71,SUSE-OpenStack-Cloud-8-2023-71,SUSE-OpenStack-Cloud-Crowbar-8-2023-71
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openstack-barbican", "title": "Title of the patch" }, { "category": "description", "text": "This update for openstack-barbican contains the following fix:\n\nSecurity fix included on this update:\nopenstack-barbican:\n\n- CVE-2022-3100: Fixed an access policy bypass via query string injection (bsc#1203873).\n\nUpdate for openstack-barbican:\n- Add patch for CVE-2022-3100 to address access policy bypass via query string injection. (bsc#1203873, CVE-2022-3100)\n ", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2023-71,SUSE-2023-71,SUSE-OpenStack-Cloud-8-2023-71,SUSE-OpenStack-Cloud-Crowbar-8-2023-71", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0071-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:0071-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230071-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:0071-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013455.html" }, { "category": "self", "summary": "SUSE Bug 1203873", "url": "https://bugzilla.suse.com/1203873" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3100 page", "url": "https://www.suse.com/security/cve/CVE-2022-3100/" } ], "title": "Security update for openstack-barbican", "tracking": { "current_release_date": "2023-01-11T14:41:08Z", "generator": { "date": "2023-01-11T14:41:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:0071-1", "initial_release_date": "2023-01-11T14:41:08Z", "revision_history": [ { "date": "2023-01-11T14:41:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openstack-barbican-5.0.2~dev3-3.17.2.noarch", "product": { "name": "openstack-barbican-5.0.2~dev3-3.17.2.noarch", "product_id": "openstack-barbican-5.0.2~dev3-3.17.2.noarch" } }, { "category": "product_version", "name": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "product": { "name": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "product_id": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch" } }, { "category": "product_version", "name": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "product": { "name": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "product_id": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch" } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "product": { "name": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "product_id": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch" } }, { "category": "product_version", "name": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "product": { "name": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "product_id": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch" } }, { "category": "product_version", "name": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "product": { "name": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "product_id": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch" } }, { "category": "product_version", "name": "python-barbican-5.0.2~dev3-3.17.2.noarch", "product": { "name": "python-barbican-5.0.2~dev3-3.17.2.noarch", "product_id": "python-barbican-5.0.2~dev3-3.17.2.noarch" } }, { "category": "product_version", "name": "venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "product": { "name": "venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "product_id": "venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch" } }, { "category": "product_version", "name": "openstack-barbican-test-5.0.2~dev3-3.17.2.noarch", "product": { "name": "openstack-barbican-test-5.0.2~dev3-3.17.2.noarch", "product_id": "openstack-barbican-test-5.0.2~dev3-3.17.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-5.0.2~dev3-3.17.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-5.0.2~dev3-3.17.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:python-barbican-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "python-barbican-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch" }, "product_reference": "venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:python-barbican-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "python-barbican-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch" }, "product_reference": "venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-5.0.2~dev3-3.17.2.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:python-barbican-5.0.2~dev3-3.17.2.noarch" }, "product_reference": "python-barbican-5.0.2~dev3-3.17.2.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3100", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3100" } ], "notes": [ { "category": "general", "text": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:python-barbican-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:python-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:python-barbican-5.0.2~dev3-3.17.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3100", "url": "https://www.suse.com/security/cve/CVE-2022-3100" }, { "category": "external", "summary": "SUSE Bug 1203873 for CVE-2022-3100", "url": "https://bugzilla.suse.com/1203873" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:python-barbican-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:python-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:python-barbican-5.0.2~dev3-3.17.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:python-barbican-5.0.2~dev3-3.17.2.noarch", "HPE Helion OpenStack 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:python-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud 8:venv-openstack-barbican-x86_64-5.0.2~dev3-12.43.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-api-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-doc-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-keystone-listener-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-retry-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:openstack-barbican-worker-5.0.2~dev3-3.17.2.noarch", "SUSE OpenStack Cloud Crowbar 8:python-barbican-5.0.2~dev3-3.17.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-01-11T14:41:08Z", "details": "important" } ], "title": "CVE-2022-3100" } ] }
wid-sec-w-2022-1586
Vulnerability from csaf_certbund
Published
2022-09-29 22:00
Modified
2023-01-11 23:00
Summary
Red Hat OpenStack: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu können.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat OpenStack ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu k\u00f6nnen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat OpenStack ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1586 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1586.json" }, { "category": "self", "summary": "WID-SEC-2022-1586 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1586" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0070-1 vom 2023-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013456.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6750 vom 2022-09-29", "url": "https://access.redhat.com/errata/RHSA-2022:6750" }, { "category": "external", "summary": "Debian Security Advisory DLA-3136 vom 2022-10-04", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00005.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5247 vom 2022-10-04", "url": "https://lists.debian.org/debian-security-announce/2022/msg00216.html" } ], "source_lang": "en-US", "title": "Red Hat OpenStack: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2023-01-11T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:35:54.762+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1586", "initial_release_date": "2022-09-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack 16.1", "product": { "name": "Red Hat OpenStack 16.1", "product_id": "849270", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1" } } }, { "category": "product_name", "name": "Red Hat OpenStack 13", "product": { "name": "Red Hat OpenStack 13", "product_id": "879070", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13" } } }, { "category": "product_name", "name": "Red Hat OpenStack 16.2", "product": { "name": "Red Hat OpenStack 16.2", "product_id": "T020428", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2" } } }, { "category": "product_name", "name": "Red Hat OpenStack 17", "product": { "name": "Red Hat OpenStack 17", "product_id": "T024759", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17" } } } ], "category": "product_name", "name": "OpenStack" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3100", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat OpenStack in der Barbican REST API. Ein Angreifer kann speziell gestaltete Query-Strings injizieren, um die Zugriffsregeln zu umgehen." } ], "product_status": { "known_affected": [ "T024759", "2951", "T002207", "849270", "T020428", "879070" ] }, "release_date": "2022-09-29T22:00:00.000+00:00", "title": "CVE-2022-3100" } ] }
fkie_cve-2022-3100
Vulnerability from fkie_nvd
Published
2023-01-18 17:15
Modified
2025-04-03 20:15
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
Summary
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2022-3100 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2022-3100 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | barbican | - | |
redhat | openstack | 13 | |
redhat | openstack | 16.1 | |
redhat | openstack | 16.2 | |
redhat | openstack | 17 | |
redhat | openstack_for_ibm_power | 13 | |
redhat | openstack_for_ibm_power | 16.1 | |
redhat | openstack_for_ibm_power | 16.2 | |
redhat | openstack_platform | 13.0 | |
redhat | enterprise_linux_eus | 7.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:barbican:-:*:*:*:*:*:*:*", "matchCriteriaId": "596EFC6C-4D91-4EDF-9EC6-1C58EB485C5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:*", "matchCriteriaId": "BC52495A-0275-4FC5-869B-7137E7FE115E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9D3F4FF-AD3D-4D17-93E8-84CAFCED2F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*", "matchCriteriaId": "FFE398FE-EE7C-4B64-ABB6-24697E047C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:*", "matchCriteriaId": "BC12AF01-CCDD-4AB6-8F44-32058A63BAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack_for_ibm_power:13:*:*:*:els:*:*:*", "matchCriteriaId": "1669C672-84CB-46D7-802A-4489749C8821", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D272E454-64F0-4BD2-9EE8-B2A48023758A", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "8DD273B9-4536-42E5-9F90-52408D263B22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "C52600BF-9E87-4CD2-91F3-685AFE478C1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." }, { "lang": "es", "value": "Se encontr\u00f3 una falla en el componente openstack-barbican. Este problema permite omitir la pol\u00edtica de acceso a trav\u00e9s de una cadena de consulta al acceder a la API." } ], "id": "CVE-2022-3100", "lastModified": "2025-04-03T20:15:17.363", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-18T17:15:10.173", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "secalert@redhat.com", "type": "Primary" } ] }
ghsa-5hg3-ffv7-g5ff
Vulnerability from github
Published
2023-01-18 18:30
Modified
2023-01-26 15:30
Severity ?
VLAI Severity ?
Details
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
{ "affected": [], "aliases": [ "CVE-2022-3100" ], "database_specific": { "cwe_ids": [ "CWE-305" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-01-18T17:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "id": "GHSA-5hg3-ffv7-g5ff", "modified": "2023-01-26T15:30:31Z", "published": "2023-01-18T18:30:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "type": "CVSS_V3" } ] }
rhsa-2022:6750
Vulnerability from csaf_redhat
Published
2022-09-29 12:42
Modified
2025-08-02 12:37
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update
Notes
Topic
An update for openstack-barbican is now available for Red Hat OpenStack
Platform.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Barbican is a ReST API designed for the secure storage, provisioning and
management of secrets, including in OpenStack environments.
Security Fix(es):
* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-barbican is now available for Red Hat OpenStack\nPlatform.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Barbican is a ReST API designed for the secure storage, provisioning and\nmanagement of secrets, including in OpenStack environments.\n\nSecurity Fix(es):\n\n* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6750", "url": "https://access.redhat.com/errata/RHSA-2022:6750" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6750.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update", "tracking": { "current_release_date": "2025-08-02T12:37:40+00:00", "generator": { "date": "2025-08-02T12:37:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2022:6750", "initial_release_date": "2022-09-29T12:42:20+00:00", "revision_history": [ { "date": "2022-09-29T12:42:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-29T12:42:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T12:37:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 17.0", "product": { "name": "Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17.0::el9" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product": { "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 - ELS", "product": { "name": "Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-barbican@6.0.1-6.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Douglas Mendizabal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2022-3100", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2022-09-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2125404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-barbican: access policy bypass via query string injection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "known_not_affected": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" }, { "category": "external", "summary": "RHBZ#2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3100", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100" } ], "release_date": "2022-09-28T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T12:42:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openstack-barbican: access policy bypass via query string injection" } ] }
gsd-2022-3100
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-3100", "id": "GSD-2022-3100", "references": [ "https://www.debian.org/security/2022/dsa-5247", "https://access.redhat.com/errata/RHSA-2022:6750", "https://www.suse.com/security/cve/CVE-2022-3100.html", "https://ubuntu.com/security/CVE-2022-3100" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-3100" ], "details": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "id": "GSD-2022-3100", "modified": "2023-12-13T01:19:40.109969Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2022-3100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat OpenStack Platform", "version": { "version_data": [ { "version_value": "13.0-17.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-305" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/security/cve/CVE-2022-3100", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openstack:barbican:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack_for_ibm_power:13:*:*:*:els:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2022-3100" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-305" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/security/cve/CVE-2022-3100", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2 } }, "lastModifiedDate": "2023-01-26T15:11Z", "publishedDate": "2023-01-18T17:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…