Add the feed URL directly to your feed reader: https://cloud.google.com/feeds/cloudbuild-security-bulletins.xml
GCP-2023-013
Published: 2023-06-08
Description
Description
Severity
Notes
When you enable the Cloud Build API in a project,
Cloud Build automatically creates a
default service account to
execute builds on your behalf. This Cloud Build legacy service account
previously had the logging.privateLogEntries.list IAM
permission, which allowed the build to have access to list private logs by default.
This permission has now been revoked from the Cloud Build service
account to adhere to the
security principle of least privilege.
What should I do?
No further user action is required. The logging.privateLogEntries.list
IAM permission has been revoked from the
Cloud Build legacy service account and the fix has been rolled out.
What vulnerabilities are addressed by this patch?
This vulnerability granted builds the permission to list private logs.
Since the logging.privateLogEntries.list IAM
permission has now been revoked from the Cloud Build legacy service account,
builds no longer have access to list private logs by default.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-10-30 UTC."],[],[]]