<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0087</id>
    <title>An update for pki-core is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2023-04-13 03:08:49"/>
    <updated date="2023-04-13 03:08:49"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2393" id="CVE-2022-2393" title="CVE-2022-2393 Base Score: 5.7 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2414" id="CVE-2022-2414" title="CVE-2022-2414 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content. (CVE-2022-2393)

Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. (CVE-2022-2414)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="pki-core">
        <name>HCE 1.1</name>
        <package arch="noarch" name="pki-base" version="10.5.18" release="25.hce1c">
          <filename>pki-base-10.5.18-25.hce1c.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="pki-base-java" version="10.5.18" release="25.hce1c">
          <filename>pki-base-java-10.5.18-25.hce1c.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="pki-ca" version="10.5.18" release="25.hce1c">
          <filename>pki-ca-10.5.18-25.hce1c.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="pki-kra" version="10.5.18" release="25.hce1c">
          <filename>pki-kra-10.5.18-25.hce1c.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="pki-server" version="10.5.18" release="25.hce1c">
          <filename>pki-server-10.5.18-25.hce1c.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="pki-symkey" version="10.5.18" release="25.hce1c">
          <filename>pki-symkey-10.5.18-25.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="pki-tools" version="10.5.18" release="25.hce1c">
          <filename>pki-tools-10.5.18-25.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
