An update for linux-sgx is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1951
Final
1.0
1.0
2022-09-23
Initial
2022-09-23
2022-09-23
openEuler SA Tool V1.0
2022-09-23
linux-sgx security update
An update for linux-sgx is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
Intel(R) Software Guard Extensions (Intel(R) SGX) is an Intel technology for application developers seeking to protect select code and data from disclosure or modification.
Security Fix(es):
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).(CVE-2022-1292)
An update for linux-sgx is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
linux-sgx
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1951
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-1292
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
linux-sgx-2.11.100-12.oe1.src.rpm
linux-sgx-2.11.100-11.oe1.src.rpm
linux-sgx-2.15.1-6.oe2203.src.rpm
libsgx-dcap-ql-2.11.100-12.oe1.x86_64.rpm
libsgx-launch-devel-2.11.100-12.oe1.x86_64.rpm
sgx-aesm-service-2.11.100-12.oe1.x86_64.rpm
libsgx-aesm-launch-plugin-2.11.100-12.oe1.x86_64.rpm
libsgx-enclave-common-devel-2.11.100-12.oe1.x86_64.rpm
sgxsdk-2.11.100-12.oe1.x86_64.rpm
libsgx-quote-ex-2.11.100-12.oe1.x86_64.rpm
libsgx-uae-service-2.11.100-12.oe1.x86_64.rpm
libsgx-ra-network-2.11.100-12.oe1.x86_64.rpm
libsgx-epid-devel-2.11.100-12.oe1.x86_64.rpm
libsgx-aesm-quote-ex-plugin-2.11.100-12.oe1.x86_64.rpm
libsgx-enclave-common-2.11.100-12.oe1.x86_64.rpm
libsgx-launch-2.11.100-12.oe1.x86_64.rpm
libsgx-ra-network-devel-2.11.100-12.oe1.x86_64.rpm
libsgx-dcap-quote-verify-2.11.100-12.oe1.x86_64.rpm
libsgx-quote-ex-devel-2.11.100-12.oe1.x86_64.rpm
libsgx-ae-epid-2.11.100-12.oe1.x86_64.rpm
libsgx-urts-2.11.100-12.oe1.x86_64.rpm
libsgx-aesm-epid-plugin-2.11.100-12.oe1.x86_64.rpm
linux-sgx-debuginfo-2.11.100-12.oe1.x86_64.rpm
linux-sgx-debugsource-2.11.100-12.oe1.x86_64.rpm
libsgx-dcap-ql-devel-2.11.100-12.oe1.x86_64.rpm
libsgx-dcap-quote-verify-devel-2.11.100-12.oe1.x86_64.rpm
libsgx-ra-uefi-2.11.100-12.oe1.x86_64.rpm
sgx-pck-id-retrieval-tool-2.11.100-12.oe1.x86_64.rpm
libsgx-epid-2.11.100-12.oe1.x86_64.rpm
libsgx-aesm-pce-plugin-2.11.100-12.oe1.x86_64.rpm
libsgx-ae-qe3-2.11.100-12.oe1.x86_64.rpm
libsgx-dcap-default-qpl-2.11.100-12.oe1.x86_64.rpm
libsgx-pce-logic-2.11.100-12.oe1.x86_64.rpm
libsgx-ae-pce-2.11.100-12.oe1.x86_64.rpm
libsgx-ra-uefi-devel-2.11.100-12.oe1.x86_64.rpm
libsgx-dcap-default-qpl-devel-2.11.100-12.oe1.x86_64.rpm
libsgx-ae-le-2.11.100-12.oe1.x86_64.rpm
libsgx-qe3-logic-2.11.100-12.oe1.x86_64.rpm
libsgx-ae-qve-2.11.100-12.oe1.x86_64.rpm
sgx-dcap-pccs-2.11.100-12.oe1.x86_64.rpm
sgx-ra-service-2.11.100-12.oe1.x86_64.rpm
libsgx-aesm-ecdsa-plugin-2.11.100-12.oe1.x86_64.rpm
libsgx-ra-uefi-2.11.100-11.oe1.x86_64.rpm
libsgx-ra-network-2.11.100-11.oe1.x86_64.rpm
linux-sgx-debuginfo-2.11.100-11.oe1.x86_64.rpm
libsgx-dcap-default-qpl-devel-2.11.100-11.oe1.x86_64.rpm
libsgx-dcap-default-qpl-2.11.100-11.oe1.x86_64.rpm
linux-sgx-debugsource-2.11.100-11.oe1.x86_64.rpm
libsgx-epid-2.11.100-11.oe1.x86_64.rpm
libsgx-aesm-launch-plugin-2.11.100-11.oe1.x86_64.rpm
libsgx-enclave-common-devel-2.11.100-11.oe1.x86_64.rpm
sgx-pck-id-retrieval-tool-2.11.100-11.oe1.x86_64.rpm
libsgx-dcap-ql-devel-2.11.100-11.oe1.x86_64.rpm
libsgx-quote-ex-2.11.100-11.oe1.x86_64.rpm
libsgx-uae-service-2.11.100-11.oe1.x86_64.rpm
libsgx-aesm-quote-ex-plugin-2.11.100-11.oe1.x86_64.rpm
libsgx-dcap-ql-2.11.100-11.oe1.x86_64.rpm
libsgx-dcap-quote-verify-2.11.100-11.oe1.x86_64.rpm
libsgx-dcap-quote-verify-devel-2.11.100-11.oe1.x86_64.rpm
libsgx-aesm-pce-plugin-2.11.100-11.oe1.x86_64.rpm
libsgx-ae-qve-2.11.100-11.oe1.x86_64.rpm
sgx-aesm-service-2.11.100-11.oe1.x86_64.rpm
libsgx-ra-uefi-devel-2.11.100-11.oe1.x86_64.rpm
libsgx-launch-2.11.100-11.oe1.x86_64.rpm
libsgx-quote-ex-devel-2.11.100-11.oe1.x86_64.rpm
libsgx-ra-network-devel-2.11.100-11.oe1.x86_64.rpm
sgx-dcap-pccs-2.11.100-11.oe1.x86_64.rpm
libsgx-ae-epid-2.11.100-11.oe1.x86_64.rpm
libsgx-ae-qe3-2.11.100-11.oe1.x86_64.rpm
libsgx-aesm-ecdsa-plugin-2.11.100-11.oe1.x86_64.rpm
libsgx-qe3-logic-2.11.100-11.oe1.x86_64.rpm
libsgx-urts-2.11.100-11.oe1.x86_64.rpm
libsgx-ae-le-2.11.100-11.oe1.x86_64.rpm
libsgx-ae-pce-2.11.100-11.oe1.x86_64.rpm
libsgx-launch-devel-2.11.100-11.oe1.x86_64.rpm
libsgx-pce-logic-2.11.100-11.oe1.x86_64.rpm
sgx-ra-service-2.11.100-11.oe1.x86_64.rpm
libsgx-aesm-epid-plugin-2.11.100-11.oe1.x86_64.rpm
sgxsdk-2.11.100-11.oe1.x86_64.rpm
libsgx-epid-devel-2.11.100-11.oe1.x86_64.rpm
libsgx-enclave-common-2.11.100-11.oe1.x86_64.rpm
libsgx-urts-2.15.1-6.oe2203.x86_64.rpm
linux-sgx-debugsource-2.15.1-6.oe2203.x86_64.rpm
libsgx-launch-devel-2.15.1-6.oe2203.x86_64.rpm
sgx-ra-service-2.15.1-6.oe2203.x86_64.rpm
libsgx-epid-2.15.1-6.oe2203.x86_64.rpm
libsgx-dcap-default-qpl-devel-2.15.1-6.oe2203.x86_64.rpm
libsgx-aesm-epid-plugin-2.15.1-6.oe2203.x86_64.rpm
libsgx-uae-service-2.15.1-6.oe2203.x86_64.rpm
libsgx-ae-qve-2.15.1-6.oe2203.x86_64.rpm
libsgx-ae-pce-2.15.1-6.oe2203.x86_64.rpm
libsgx-dcap-default-qpl-2.15.1-6.oe2203.x86_64.rpm
libsgx-aesm-pce-plugin-2.15.1-6.oe2203.x86_64.rpm
libsgx-ra-network-2.15.1-6.oe2203.x86_64.rpm
libsgx-headers-2.15.1-6.oe2203.x86_64.rpm
libsgx-qe3-logic-2.15.1-6.oe2203.x86_64.rpm
libsgx-aesm-quote-ex-plugin-2.15.1-6.oe2203.x86_64.rpm
libsgx-enclave-common-2.15.1-6.oe2203.x86_64.rpm
sgx-pck-id-retrieval-tool-2.15.1-6.oe2203.x86_64.rpm
libsgx-dcap-quote-verify-devel-2.15.1-6.oe2203.x86_64.rpm
libsgx-epid-devel-2.15.1-6.oe2203.x86_64.rpm
sgx-dcap-pccs-2.15.1-6.oe2203.x86_64.rpm
libsgx-ae-qe3-2.15.1-6.oe2203.x86_64.rpm
libsgx-dcap-ql-2.15.1-6.oe2203.x86_64.rpm
libsgx-launch-2.15.1-6.oe2203.x86_64.rpm
libsgx-ae-le-2.15.1-6.oe2203.x86_64.rpm
libsgx-aesm-launch-plugin-2.15.1-6.oe2203.x86_64.rpm
libsgx-pce-logic-2.15.1-6.oe2203.x86_64.rpm
linux-sgx-debuginfo-2.15.1-6.oe2203.x86_64.rpm
sgx-aesm-service-2.15.1-6.oe2203.x86_64.rpm
libsgx-enclave-common-devel-2.15.1-6.oe2203.x86_64.rpm
libsgx-aesm-ecdsa-plugin-2.15.1-6.oe2203.x86_64.rpm
libsgx-ra-uefi-devel-2.15.1-6.oe2203.x86_64.rpm
sgxsdk-2.15.1-6.oe2203.x86_64.rpm
libsgx-quote-ex-2.15.1-6.oe2203.x86_64.rpm
libsgx-quote-ex-devel-2.15.1-6.oe2203.x86_64.rpm
libsgx-dcap-quote-verify-2.15.1-6.oe2203.x86_64.rpm
libsgx-dcap-ql-devel-2.15.1-6.oe2203.x86_64.rpm
libsgx-ra-uefi-2.15.1-6.oe2203.x86_64.rpm
libsgx-ra-network-devel-2.15.1-6.oe2203.x86_64.rpm
libsgx-ae-epid-2.15.1-6.oe2203.x86_64.rpm
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
2022-09-23
CVE-2022-1292
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Medium
6.7
AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
linux-sgx security update
2022-09-23
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1951