DEBIAN-CVE-2022-21949

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2022-21949
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-21949.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-21949
Upstream
Published
2022-05-03T08:15:06Z
Modified
2025-09-19T06:17:07Z
Summary
[none]
Details

A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13.

References

Affected packages

Debian:12 / ruby-xmlhash

Package

Name
ruby-xmlhash
Purl
pkg:deb/debian/ruby-xmlhash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.6-3.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}