This update for openstack-barbican contains the following fix:
Security fix included on this update: openstack-barbican:
Update for openstack-barbican: - Add patch for CVE-2022-3100 to address access policy bypass via query string injection. (bsc#1203873, CVE-2022-3100)
{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2"
}
]
}{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2"
}
]
}{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2"
}
]
}{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2"
}
]
}{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2"
}
]
}{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2"
}
]
}{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2"
}
]
}{
"binaries": [
{
"openstack-barbican-worker": "5.0.2~dev3-3.17.2",
"openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2",
"openstack-barbican-retry": "5.0.2~dev3-3.17.2",
"openstack-barbican-api": "5.0.2~dev3-3.17.2",
"openstack-barbican": "5.0.2~dev3-3.17.2",
"python-barbican": "5.0.2~dev3-3.17.2",
"openstack-barbican-doc": "5.0.2~dev3-3.17.2"
}
]
}