Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-3100
Vulnerability from cvelistv5
Published
2023-01-18 00:00
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2022-3100 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2022-3100 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Red Hat OpenStack Platform |
Version: 13.0-17.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Red Hat OpenStack Platform", "vendor": "n/a", "versions": [ { "status": "affected", "version": "13.0-17.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-18T00:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2022-3100", "datePublished": "2023-01-18T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T01:00:10.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:barbican:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"596EFC6C-4D91-4EDF-9EC6-1C58EB485C5E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:*\", \"matchCriteriaId\": \"BC52495A-0275-4FC5-869B-7137E7FE115E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9D3F4FF-AD3D-4D17-93E8-84CAFCED2F59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFE398FE-EE7C-4B64-ABB6-24697E047C85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC12AF01-CCDD-4AB6-8F44-32058A63BAFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack_for_ibm_power:13:*:*:*:els:*:*:*\", \"matchCriteriaId\": \"1669C672-84CB-46D7-802A-4489749C8821\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D272E454-64F0-4BD2-9EE8-B2A48023758A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DD273B9-4536-42E5-9F90-52408D263B22\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C52600BF-9E87-4CD2-91F3-685AFE478C1E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 una falla en el componente openstack-barbican. Este problema permite omitir la pol\\u00edtica de acceso a trav\\u00e9s de una cadena de consulta al acceder a la API.\"}]", "id": "CVE-2022-3100", "lastModified": "2024-11-21T07:18:49.680", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 4.2}]}", "published": "2023-01-18T17:15:10.173", "references": "[{\"url\": \"https://access.redhat.com/security/cve/CVE-2022-3100\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2022-3100\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-305\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-3100\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-01-18T17:15:10.173\",\"lastModified\":\"2024-11-21T07:18:49.680\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en el componente openstack-barbican. Este problema permite omitir la pol\u00edtica de acceso a trav\u00e9s de una cadena de consulta al acceder a la API.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-305\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:barbican:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596EFC6C-4D91-4EDF-9EC6-1C58EB485C5E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:*\",\"matchCriteriaId\":\"BC52495A-0275-4FC5-869B-7137E7FE115E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D3F4FF-AD3D-4D17-93E8-84CAFCED2F59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFE398FE-EE7C-4B64-ABB6-24697E047C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC12AF01-CCDD-4AB6-8F44-32058A63BAFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_for_ibm_power:13:*:*:*:els:*:*:*\",\"matchCriteriaId\":\"1669C672-84CB-46D7-802A-4489749C8821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D272E454-64F0-4BD2-9EE8-B2A48023758A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DD273B9-4536-42E5-9F90-52408D263B22\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52600BF-9E87-4CD2-91F3-685AFE478C1E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-3100\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2022-3100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
RHSA-2022:6750
Vulnerability from csaf_redhat
Published
2022-09-29 12:42
Modified
2024-11-15 13:13
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update
Notes
Topic
An update for openstack-barbican is now available for Red Hat OpenStack
Platform.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Barbican is a ReST API designed for the secure storage, provisioning and
management of secrets, including in OpenStack environments.
Security Fix(es):
* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-barbican is now available for Red Hat OpenStack\nPlatform.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Barbican is a ReST API designed for the secure storage, provisioning and\nmanagement of secrets, including in OpenStack environments.\n\nSecurity Fix(es):\n\n* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6750", "url": "https://access.redhat.com/errata/RHSA-2022:6750" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6750.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update", "tracking": { "current_release_date": "2024-11-15T13:13:28+00:00", "generator": { "date": "2024-11-15T13:13:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6750", "initial_release_date": "2022-09-29T12:42:20+00:00", "revision_history": [ { "date": "2022-09-29T12:42:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-29T12:42:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:13:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 17.0", "product": { "name": "Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17.0::el9" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product": { "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 - ELS", "product": { "name": "Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-barbican@6.0.1-6.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Douglas Mendizabal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2022-3100", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2022-09-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2125404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-barbican: access policy bypass via query string injection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "known_not_affected": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" }, { "category": "external", "summary": "RHBZ#2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3100", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100" } ], "release_date": "2022-09-28T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T12:42:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openstack-barbican: access policy bypass via query string injection" } ] }
rhsa-2022:6750
Vulnerability from csaf_redhat
Published
2022-09-29 12:42
Modified
2024-11-15 13:13
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update
Notes
Topic
An update for openstack-barbican is now available for Red Hat OpenStack
Platform.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Barbican is a ReST API designed for the secure storage, provisioning and
management of secrets, including in OpenStack environments.
Security Fix(es):
* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-barbican is now available for Red Hat OpenStack\nPlatform.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Barbican is a ReST API designed for the secure storage, provisioning and\nmanagement of secrets, including in OpenStack environments.\n\nSecurity Fix(es):\n\n* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6750", "url": "https://access.redhat.com/errata/RHSA-2022:6750" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6750.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update", "tracking": { "current_release_date": "2024-11-15T13:13:28+00:00", "generator": { "date": "2024-11-15T13:13:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6750", "initial_release_date": "2022-09-29T12:42:20+00:00", "revision_history": [ { "date": "2022-09-29T12:42:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-29T12:42:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:13:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 17.0", "product": { "name": "Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17.0::el9" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product": { "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 - ELS", "product": { "name": "Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-barbican@6.0.1-6.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Douglas Mendizabal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2022-3100", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2022-09-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2125404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-barbican: access policy bypass via query string injection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "known_not_affected": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" }, { "category": "external", "summary": "RHBZ#2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3100", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100" } ], "release_date": "2022-09-28T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T12:42:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openstack-barbican: access policy bypass via query string injection" } ] }
rhsa-2022_6750
Vulnerability from csaf_redhat
Published
2022-09-29 12:42
Modified
2024-11-15 13:13
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update
Notes
Topic
An update for openstack-barbican is now available for Red Hat OpenStack
Platform.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Barbican is a ReST API designed for the secure storage, provisioning and
management of secrets, including in OpenStack environments.
Security Fix(es):
* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-barbican is now available for Red Hat OpenStack\nPlatform.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Barbican is a ReST API designed for the secure storage, provisioning and\nmanagement of secrets, including in OpenStack environments.\n\nSecurity Fix(es):\n\n* openstack-barbican: access policy bypass via query string injection (CVE-2022-3100)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6750", "url": "https://access.redhat.com/errata/RHSA-2022:6750" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6750.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update", "tracking": { "current_release_date": "2024-11-15T13:13:28+00:00", "generator": { "date": "2024-11-15T13:13:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6750", "initial_release_date": "2022-09-29T12:42:20+00:00", "revision_history": [ { "date": "2022-09-29T12:42:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-29T12:42:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:13:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 17.0", "product": { "name": "Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17.0::el9" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product": { "name": "Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0 - ELS", "product": { "name": "Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=src" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_id": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.1-1.20220112203416.07be198.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_id": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@9.0.2-2.20220122185349.c718783.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_id": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-barbican@12.0.1-0.20220614210405.486e607.el9ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-api@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-common@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-keystone-listener@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_id": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-barbican-worker@6.0.1-6.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_id": "python-barbican-0:6.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-barbican@6.0.1-6.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server", "product_id": "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:6.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src" }, "product_reference": "openstack-barbican-0:6.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch" }, "product_reference": "openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-barbican-0:6.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0 - ELS", "product_id": "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch" }, "product_reference": "python-barbican-0:6.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src" }, "product_reference": "openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch" }, "product_reference": "python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src" }, "product_reference": "openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch as a component of Red Hat OpenStack Platform 17.0", "product_id": "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" }, "product_reference": "python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "relates_to_product_reference": "9Base-RHOS-17.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Douglas Mendizabal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2022-3100", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2022-09-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2125404" } ], "notes": [ { "category": "description", "text": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-barbican: access policy bypass via query string injection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "known_not_affected": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:python-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-keystone-listener-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-worker-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:python-barbican-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-keystone-listener-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-worker-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-keystone-listener-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-worker-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-keystone-listener-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-worker-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" }, { "category": "external", "summary": "RHBZ#2125404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3100", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100" } ], "release_date": "2022-09-28T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T12:42:20+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "products": [ "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-7.6.EUS-RH7-RHOS-13.0:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-0:6.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-api-0:6.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0-ELS:openstack-barbican-common-0:6.0.1-6.el7ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.src", "8Base-RHOS-16.1:openstack-barbican-api-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:openstack-barbican-common-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.1:python3-barbican-0:9.0.1-1.20220112203416.07be198.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.src", "8Base-RHOS-16.2:openstack-barbican-api-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:openstack-barbican-common-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "8Base-RHOS-16.2:python3-barbican-0:9.0.2-2.20220122185349.c718783.el8ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.src", "9Base-RHOS-17.0:openstack-barbican-api-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:openstack-barbican-common-0:12.0.1-0.20220614210405.486e607.el9ost.noarch", "9Base-RHOS-17.0:python3-barbican-0:12.0.1-0.20220614210405.486e607.el9ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openstack-barbican: access policy bypass via query string injection" } ] }
gsd-2022-3100
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-3100", "id": "GSD-2022-3100", "references": [ "https://www.debian.org/security/2022/dsa-5247", "https://access.redhat.com/errata/RHSA-2022:6750", "https://www.suse.com/security/cve/CVE-2022-3100.html", "https://ubuntu.com/security/CVE-2022-3100" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-3100" ], "details": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "id": "GSD-2022-3100", "modified": "2023-12-13T01:19:40.109969Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2022-3100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat OpenStack Platform", "version": { "version_data": [ { "version_value": "13.0-17.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-305" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/security/cve/CVE-2022-3100", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openstack:barbican:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack_for_ibm_power:13:*:*:*:els:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2022-3100" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-305" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/security/cve/CVE-2022-3100", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2 } }, "lastModifiedDate": "2023-01-26T15:11Z", "publishedDate": "2023-01-18T17:15Z" } } }
WID-SEC-W-2022-1586
Vulnerability from csaf_certbund
Published
2022-09-29 22:00
Modified
2023-01-11 23:00
Summary
Red Hat OpenStack: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu können.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat OpenStack ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu k\u00f6nnen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat OpenStack ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1586 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1586.json" }, { "category": "self", "summary": "WID-SEC-2022-1586 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1586" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0070-1 vom 2023-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013456.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6750 vom 2022-09-29", "url": "https://access.redhat.com/errata/RHSA-2022:6750" }, { "category": "external", "summary": "Debian Security Advisory DLA-3136 vom 2022-10-04", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00005.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5247 vom 2022-10-04", "url": "https://lists.debian.org/debian-security-announce/2022/msg00216.html" } ], "source_lang": "en-US", "title": "Red Hat OpenStack: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2023-01-11T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:59:34.693+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1586", "initial_release_date": "2022-09-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack 16.1", "product": { "name": "Red Hat OpenStack 16.1", "product_id": "849270", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1" } } }, { "category": "product_name", "name": "Red Hat OpenStack 13", "product": { "name": "Red Hat OpenStack 13", "product_id": "879070", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13" } } }, { "category": "product_name", "name": "Red Hat OpenStack 16.2", "product": { "name": "Red Hat OpenStack 16.2", "product_id": "T020428", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2" } } }, { "category": "product_name", "name": "Red Hat OpenStack 17", "product": { "name": "Red Hat OpenStack 17", "product_id": "T024759", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17" } } } ], "category": "product_name", "name": "OpenStack" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3100", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat OpenStack in der Barbican REST API. Ein Angreifer kann speziell gestaltete Query-Strings injizieren, um die Zugriffsregeln zu umgehen." } ], "product_status": { "known_affected": [ "T024759", "2951", "T002207", "849270", "T020428", "879070" ] }, "release_date": "2022-09-29T22:00:00Z", "title": "CVE-2022-3100" } ] }
wid-sec-w-2022-1586
Vulnerability from csaf_certbund
Published
2022-09-29 22:00
Modified
2023-01-11 23:00
Summary
Red Hat OpenStack: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu können.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat OpenStack ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu k\u00f6nnen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat OpenStack ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1586 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1586.json" }, { "category": "self", "summary": "WID-SEC-2022-1586 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1586" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0070-1 vom 2023-01-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-January/013456.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6750 vom 2022-09-29", "url": "https://access.redhat.com/errata/RHSA-2022:6750" }, { "category": "external", "summary": "Debian Security Advisory DLA-3136 vom 2022-10-04", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00005.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5247 vom 2022-10-04", "url": "https://lists.debian.org/debian-security-announce/2022/msg00216.html" } ], "source_lang": "en-US", "title": "Red Hat OpenStack: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2023-01-11T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:59:34.693+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1586", "initial_release_date": "2022-09-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack 16.1", "product": { "name": "Red Hat OpenStack 16.1", "product_id": "849270", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1" } } }, { "category": "product_name", "name": "Red Hat OpenStack 13", "product": { "name": "Red Hat OpenStack 13", "product_id": "879070", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13" } } }, { "category": "product_name", "name": "Red Hat OpenStack 16.2", "product": { "name": "Red Hat OpenStack 16.2", "product_id": "T020428", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2" } } }, { "category": "product_name", "name": "Red Hat OpenStack 17", "product": { "name": "Red Hat OpenStack 17", "product_id": "T024759", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17" } } } ], "category": "product_name", "name": "OpenStack" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-3100", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat OpenStack in der Barbican REST API. Ein Angreifer kann speziell gestaltete Query-Strings injizieren, um die Zugriffsregeln zu umgehen." } ], "product_status": { "known_affected": [ "T024759", "2951", "T002207", "849270", "T020428", "879070" ] }, "release_date": "2022-09-29T22:00:00Z", "title": "CVE-2022-3100" } ] }
ghsa-5hg3-ffv7-g5ff
Vulnerability from github
Published
2023-01-18 18:30
Modified
2023-01-26 15:30
Severity ?
Details
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
{ "affected": [], "aliases": [ "CVE-2022-3100" ], "database_specific": { "cwe_ids": [ "CWE-305" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-01-18T17:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.", "id": "GHSA-5hg3-ffv7-g5ff", "modified": "2023-01-26T15:30:31Z", "published": "2023-01-18T18:30:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3100" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "type": "CVSS_V3" } ] }
CVE-2022-3100
Vulnerability from fkie_nvd
Published
2023-01-18 17:15
Modified
2024-11-21 07:18
Severity ?
Summary
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2022-3100 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2022-3100 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | barbican | - | |
redhat | openstack | 13 | |
redhat | openstack | 16.1 | |
redhat | openstack | 16.2 | |
redhat | openstack | 17 | |
redhat | openstack_for_ibm_power | 13 | |
redhat | openstack_for_ibm_power | 16.1 | |
redhat | openstack_for_ibm_power | 16.2 | |
redhat | openstack_platform | 13.0 | |
redhat | enterprise_linux_eus | 7.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:barbican:-:*:*:*:*:*:*:*", "matchCriteriaId": "596EFC6C-4D91-4EDF-9EC6-1C58EB485C5E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:els:*:*:*", "matchCriteriaId": "BC52495A-0275-4FC5-869B-7137E7FE115E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9D3F4FF-AD3D-4D17-93E8-84CAFCED2F59", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:16.2:-:*:*:*:*:*:*", "matchCriteriaId": "FFE398FE-EE7C-4B64-ABB6-24697E047C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:17:*:*:*:*:*:*:*", "matchCriteriaId": "BC12AF01-CCDD-4AB6-8F44-32058A63BAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack_for_ibm_power:13:*:*:*:els:*:*:*", "matchCriteriaId": "1669C672-84CB-46D7-802A-4489749C8821", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D272E454-64F0-4BD2-9EE8-B2A48023758A", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack_for_ibm_power:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "8DD273B9-4536-42E5-9F90-52408D263B22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "C52600BF-9E87-4CD2-91F3-685AFE478C1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API." }, { "lang": "es", "value": "Se encontr\u00f3 una falla en el componente openstack-barbican. Este problema permite omitir la pol\u00edtica de acceso a trav\u00e9s de una cadena de consulta al acceder a la API." } ], "id": "CVE-2022-3100", "lastModified": "2024-11-21T07:18:49.680", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-18T17:15:10.173", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-3100" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "secalert@redhat.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.