CVE-2022-23451

NameCVE-2022-23451
DescriptionAn authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete protected data, causing a denial of service by consuming protected resources.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
barbican (PTS)stretch1:3.0.0-3vulnerable
buster1:7.0.0-1vulnerable
buster (security)1:7.0.0-1+deb10u1vulnerable
bullseye (security), bullseye1:11.0.0-3+deb11u1vulnerable
bookworm1:15.0.1-2fixed
sid, trixie1:18.0.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
barbicansource(unstable)1:14.0.0~rc1-2

Notes

[bullseye] - barbican <no-dsa> (Minor issue)
[buster] - barbican <no-dsa> (Minor issue)
[stretch] - barbican <no-dsa> (Minor issue)
https://storyboard.openstack.org/#!/story/2009253
https://bugzilla.redhat.com/show_bug.cgi?id=2025089

Search for package or bug name: Reporting problems