Add the feed URL directly to your feed reader: https://cloud.google.com/feeds/cloudbuild-security-bulletins.xml
GCP-2023-013
Published: 2023-06-08
Description
Description
Severity
Notes
When you enable the Cloud Build API in a project, Cloud Build automatically creates a default service account to execute builds on your behalf. This Cloud Build legacy service account previously had the logging.privateLogEntries.list IAM permission, which allowed the build to have access to list private logs by default. This permission has now been revoked from the Cloud Build service account to adhere to the security principle of least privilege.
What should I do?
No further user action is required. The logging.privateLogEntries.list IAM permission has been revoked from the Cloud Build legacy service account and the fix has been rolled out.
What vulnerabilities are addressed by this patch?
This vulnerability granted builds the permission to list private logs. Since the logging.privateLogEntries.list IAM permission has now been revoked from the Cloud Build legacy service account, builds no longer have access to list private logs by default.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-24 UTC."],[],[]]