{"schema_version":"1.7.2","id":"OESA-2022-1541","modified":"2022-03-03T11:03:33Z","published":"2022-03-03T11:03:33Z","upstream":["CVE-2021-33658"],"summary":"A-Tune security update","details":"atune is a service for atuned AI tuning system.\r\n\r\nSecurity Fix(es):\r\n\r\nLog in as a local user and run the curl command to access the local atune url interface to escalate the local privilege or modify any file. Authentication is not forcibly enabled in the default configuration.(CVE-2021-33658)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"A-Tune","purl":"pkg:rpm/openEuler/A-Tune\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"atune-0.3-0.8.oe1"}]}],"ecosystem_specific":{"aarch64":["atune-client-0.3-0.8.oe1.aarch64.rpm","atune-engine-0.3-0.8.oe1.aarch64.rpm","atune-0.3-0.8.oe1.aarch64.rpm","atune-db-0.3-0.8.oe1.aarch64.rpm"],"src":["atune-0.3-0.8.oe1.src.rpm"],"x86_64":["atune-client-0.3-0.8.oe1.x86_64.rpm","atune-0.3-0.8.oe1.x86_64.rpm","atune-db-0.3-0.8.oe1.x86_64.rpm","atune-engine-0.3-0.8.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP2","name":"A-Tune","purl":"pkg:rpm/openEuler/A-Tune\u0026distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"atune-0.3-0.9.oe1"}]}],"ecosystem_specific":{"aarch64":["atune-client-0.3-0.9.oe1.aarch64.rpm","atune-engine-0.3-0.9.oe1.aarch64.rpm","atune-0.3-0.9.oe1.aarch64.rpm","atune-db-0.3-0.9.oe1.aarch64.rpm"],"src":["atune-0.3-0.9.oe1.src.rpm"],"x86_64":["atune-client-0.3-0.9.oe1.x86_64.rpm","atune-0.3-0.9.oe1.x86_64.rpm","atune-db-0.3-0.9.oe1.x86_64.rpm","atune-engine-0.3-0.9.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"A-Tune","purl":"pkg:rpm/openEuler/A-Tune\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"atune-1.0.0-3.oe1"}]}],"ecosystem_specific":{"aarch64":["atune-client-1.0.0-3.oe1.aarch64.rpm","atune-engine-1.0.0-3.oe1.aarch64.rpm","atune-1.0.0-3.oe1.aarch64.rpm","atune-db-1.0.0-3.oe1.aarch64.rpm"],"src":["atune-1.0.0-3.oe1.src.rpm"],"x86_64":["atune-client-1.0.0-3.oe1.x86_64.rpm","atune-1.0.0-3.oe1.x86_64.rpm","atune-db-1.0.0-3.oe1.x86_64.rpm","atune-engine-1.0.0-3.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33658"}],"database_specific":{"severity":"High"}}