cvrf2cusa/cvrf/2022/cvrf-openEuler-SA-2022-1674.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

106 lines
6.1 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for obs-server is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2022-1674</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2022-05-25</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2022-05-25</InitialReleaseDate>
<CurrentReleaseDate>2022-05-25</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2022-05-25</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">obs-server security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for obs-server is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The Open Build Service (OBS) backend is used to store all sources and binaries.It also calculates the need for new build jobs and distributes it.
Security Fix(es):
A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13.(CVE-2022-21949)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for obs-server is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">obs-server</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1674</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-21949</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-21949</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="obs-server-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">obs-server-2.10.11-3.oe1.src.rpm</FullProductName>
<FullProductName ProductID="obs-server-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">obs-server-2.10.11-3.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="obs-api-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">obs-api-2.10.11-3.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="obs-common-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">obs-common-2.10.11-3.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="obs-server-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">obs-server-2.10.11-3.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="obs-api-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">obs-api-2.10.11-3.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="obs-common-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">obs-common-2.10.11-3.oe1.noarch.rpm</FullProductName>
<FullProductName ProductID="obs-server-2.10.11-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">obs-server-2.10.11-3.oe1.noarch.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13.</Note>
</Notes>
<ReleaseDate>2022-05-25</ReleaseDate>
<CVE>CVE-2022-21949</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
</Status>
<Status Type="UnFixed">
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.8</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>obs-server security update</Description>
<DATE>2022-05-25</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1674</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>