This update for openstack-barbican contains the following fix:
Security fix included on this update: openstack-barbican:
Update for openstack-barbican: - Add patch for CVE-2022-3100 to address access policy bypass via query string injection. (bsc#1203873, CVE-2022-3100)
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "venv-openstack-barbican-x86_64": "5.0.2~dev3-12.43.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }
{ "binaries": [ { "openstack-barbican-doc": "5.0.2~dev3-3.17.2", "openstack-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-retry": "5.0.2~dev3-3.17.2", "python-barbican": "5.0.2~dev3-3.17.2", "openstack-barbican-keystone-listener": "5.0.2~dev3-3.17.2", "openstack-barbican-worker": "5.0.2~dev3-3.17.2", "openstack-barbican-api": "5.0.2~dev3-3.17.2" } ] }