An update for A-Tune is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1541
Final
1.0
1.0
2022-03-03
Initial
2022-03-03
2022-03-03
openEuler SA Tool V1.0
2022-03-03
A-Tune security update
An update for A-Tune is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.
atune is a service for atuned AI tuning system.
Security Fix(es):
Log in as a local user and run the curl command to access the local atune url interface to escalate the local privilege or modify any file. Authentication is not forcibly enabled in the default configuration.(CVE-2021-33658)
An update for A-Tune is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP2 and openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
A-Tune
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1541
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-33658
https://nvd.nist.gov/vuln/detail/CVE-2021-33658
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
openEuler-20.03-LTS-SP3
atune-client-0.3-0.8.oe1.aarch64.rpm
atune-engine-0.3-0.8.oe1.aarch64.rpm
atune-0.3-0.8.oe1.aarch64.rpm
atune-db-0.3-0.8.oe1.aarch64.rpm
atune-client-0.3-0.9.oe1.aarch64.rpm
atune-engine-0.3-0.9.oe1.aarch64.rpm
atune-0.3-0.9.oe1.aarch64.rpm
atune-db-0.3-0.9.oe1.aarch64.rpm
atune-client-1.0.0-3.oe1.aarch64.rpm
atune-engine-1.0.0-3.oe1.aarch64.rpm
atune-1.0.0-3.oe1.aarch64.rpm
atune-db-1.0.0-3.oe1.aarch64.rpm
atune-0.3-0.8.oe1.src.rpm
atune-0.3-0.9.oe1.src.rpm
atune-1.0.0-3.oe1.src.rpm
atune-client-0.3-0.8.oe1.x86_64.rpm
atune-0.3-0.8.oe1.x86_64.rpm
atune-db-0.3-0.8.oe1.x86_64.rpm
atune-engine-0.3-0.8.oe1.x86_64.rpm
atune-client-0.3-0.9.oe1.x86_64.rpm
atune-0.3-0.9.oe1.x86_64.rpm
atune-db-0.3-0.9.oe1.x86_64.rpm
atune-engine-0.3-0.9.oe1.x86_64.rpm
atune-client-1.0.0-3.oe1.x86_64.rpm
atune-1.0.0-3.oe1.x86_64.rpm
atune-db-1.0.0-3.oe1.x86_64.rpm
atune-engine-1.0.0-3.oe1.x86_64.rpm
Log in as a local user and run the curl command to access the local atune url interface to escalate the local privilege or modify any file. Authentication is not forcibly enabled in the default configuration.
2022-03-03
CVE-2021-33658
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
openEuler-20.03-LTS-SP3
High
7.8
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
A-Tune security update
2022-03-03
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1541