[ubuntu/focal-security] barbican 1:10.1.0-0ubuntu2.1 (Accepted)
Rodrigo Figueiredo Zaiden
rodrigo.zaiden at canonical.com
Mon Apr 25 14:33:23 UTC 2022
barbican (1:10.1.0-0ubuntu2.1) focal-security; urgency=medium
* SECURITY UPDATE: Access restrictions bypass
- debian/patches/CVE-2022-23451.patch: Change access policies to
secret metadata in barbican/common/policies/secretmeta.py. Add a new
role in barbican/common/policies/base.py and make use of these changes
in barbican/api/controllers/__init__.py,
barbican/api/controllers/secretmeta.py and
barbican/api/controllers/secrets.py.
- debian/patches/CVE-2022-23451-post.patch: Change secret policies in
barbican/common/policies/secrets.py, add tests in
barbican/tests/api/test_resources_policy.py and
functionaltests/api/v1/functional/test_secrets_rbac.py and update
api guide in api-guide/source/acls.rst.
- CVE-2022-23451
* SECURITY UPDATE: Ownership bypass
- debian/patches/CVE-2022-23452.patch: Update container secret policies
in barbican/common/policies/containers.py and add a new role in
barbican/common/policies/base.py.
- CVE-2022-23452
Date: 2022-04-21 12:53:11.643570+00:00
Changed-By: Rodrigo Figueiredo Zaiden <rodrigo.zaiden at canonical.com>
https://launchpad.net/ubuntu/+source/barbican/1:10.1.0-0ubuntu2.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Focal-changes
mailing list