Lucene search

K
ubuntuUbuntuUSN-5387-1
HistoryApr 25, 2022 - 12:00 a.m.

Barbican vulnerabilities

2022-04-2500:00:00
ubuntu.com
56
barbican
ubuntu 21.10
ubuntu 20.04 lts
ubuntu 18.04 esm
openstack
key management service
denial of service

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

50.3%

Releases

  • Ubuntu 21.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • barbican - OpenStack Key Management Service - API Server

Details

Douglas Mendizábal discovered that Barbican incorrectly handled access
restrictions. An authenticated attacker could possibly use this issue to
consume protected resources and possibly cause a denial of service.
(CVE-2022-23451, CVE-2022-23452)

OSVersionArchitecturePackageVersionFilename
Ubuntu21.10noarchpython3-barbican< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-api< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-common< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-doc< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-keystone-listener< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-worker< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu20.04noarchpython3-barbican< 1:10.1.0-0ubuntu2.1UNKNOWN
Ubuntu20.04noarchbarbican-api< 1:10.1.0-0ubuntu2.1UNKNOWN
Ubuntu20.04noarchbarbican-common< 1:10.1.0-0ubuntu2.1UNKNOWN
Ubuntu20.04noarchbarbican-doc< 1:10.1.0-0ubuntu2.1UNKNOWN
Rows per page:
1-10 of 181

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

50.3%