Lucene search

K
ubuntuUbuntuUSN-5387-1
HistoryApr 25, 2022 - 12:00 a.m.

Barbican vulnerabilities

2022-04-2500:00:00
ubuntu.com
52

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.4%

Releases

  • Ubuntu 21.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • barbican - OpenStack Key Management Service - API Server

Details

Douglas Mendizábal discovered that Barbican incorrectly handled access
restrictions. An authenticated attacker could possibly use this issue to
consume protected resources and possibly cause a denial of service.
(CVE-2022-23451, CVE-2022-23452)

OSVersionArchitecturePackageVersionFilename
Ubuntu21.10noarchpython3-barbican< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-api< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-common< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-doc< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-keystone-listener< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu21.10noarchbarbican-worker< 2:13.0.0-0ubuntu1.2UNKNOWN
Ubuntu20.04noarchpython3-barbican< 1:10.1.0-0ubuntu2.1UNKNOWN
Ubuntu20.04noarchbarbican-api< 1:10.1.0-0ubuntu2.1UNKNOWN
Ubuntu20.04noarchbarbican-common< 1:10.1.0-0ubuntu2.1UNKNOWN
Ubuntu20.04noarchbarbican-doc< 1:10.1.0-0ubuntu2.1UNKNOWN
Rows per page:
1-10 of 181

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.4%