-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.4925
                         barbican security update
                              5 October 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           barbican
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-3100  

Original Bulletin: 
   http://www.debian.org/security/2022/dsa-5247

Comment: CVSS (Max):  7.1 CVE-2022-3100 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5247-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
October 04, 2022                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : barbican
CVE ID         : CVE-2022-3100
Debian Bug     : 1021139

Douglas Mendizabal discovered that Barbican, the OpenStack Key Management
Service, incorrectly parsed requests which could allow an authenticated
user to bypass Barbican access policies.

For the stable distribution (bullseye), this problem has been fixed in
version 1:11.0.0-3+deb11u1.

We recommend that you upgrade your barbican packages.

For the detailed security status of barbican please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/barbican

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=mpgp
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=jK4U
-----END PGP SIGNATURE-----