Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 5 of 5 results


CVE-2023-1636

Medium priority
Ignored

A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the...

1 affected packages

barbican

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
barbican Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-1633

Medium priority
Ignored

A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.

1 affected packages

barbican

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
barbican Not affected Not affected Not affected Not affected
Show less packages

CVE-2022-3100

Medium priority

Some fixes available 3 of 4

A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.

1 affected packages

barbican

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
barbican Not affected Fixed Fixed Fixed Vulnerable
Show less packages

CVE-2022-23452

Medium priority
Fixed

An authorization flaw was found in openstack-barbican, where anyone with an admin role could add secrets to a different project container. This flaw allows an attacker on the network to consume protected resources and cause a...

1 affected packages

barbican

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
barbican Not affected Fixed Fixed Not affected
Show less packages

CVE-2022-23451

Medium priority

Some fixes available 3 of 4

An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw...

1 affected packages

barbican

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
barbican Not affected Not affected Fixed Fixed Vulnerable
Show less packages