openEuler update for linux-sgx



Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-2068
CVE-2022-2097
CVE-2022-1292
CWE-ID CWE-78
CWE-311
Exploitation vector Network
Public exploit Public exploit code for vulnerability #3 is available.
Vulnerable software
openEuler
Operating systems & Components / Operating system

libsgx-aesm-ecdsa-plugin
Operating systems & Components / Operating system package or component

sgx-ra-service
Operating systems & Components / Operating system package or component

sgx-dcap-pccs
Operating systems & Components / Operating system package or component

libsgx-ae-qve
Operating systems & Components / Operating system package or component

libsgx-qe3-logic
Operating systems & Components / Operating system package or component

libsgx-ae-le
Operating systems & Components / Operating system package or component

libsgx-dcap-default-qpl-devel
Operating systems & Components / Operating system package or component

libsgx-ra-uefi-devel
Operating systems & Components / Operating system package or component

libsgx-ae-pce
Operating systems & Components / Operating system package or component

libsgx-pce-logic
Operating systems & Components / Operating system package or component

libsgx-dcap-default-qpl
Operating systems & Components / Operating system package or component

libsgx-ae-qe3
Operating systems & Components / Operating system package or component

libsgx-aesm-pce-plugin
Operating systems & Components / Operating system package or component

libsgx-epid
Operating systems & Components / Operating system package or component

sgx-pck-id-retrieval-tool
Operating systems & Components / Operating system package or component

libsgx-ra-uefi
Operating systems & Components / Operating system package or component

libsgx-dcap-quote-verify-devel
Operating systems & Components / Operating system package or component

libsgx-dcap-ql-devel
Operating systems & Components / Operating system package or component

linux-sgx-debugsource
Operating systems & Components / Operating system package or component

linux-sgx-debuginfo
Operating systems & Components / Operating system package or component

libsgx-aesm-epid-plugin
Operating systems & Components / Operating system package or component

libsgx-urts
Operating systems & Components / Operating system package or component

libsgx-ae-epid
Operating systems & Components / Operating system package or component

libsgx-quote-ex-devel
Operating systems & Components / Operating system package or component

libsgx-dcap-quote-verify
Operating systems & Components / Operating system package or component

libsgx-ra-network-devel
Operating systems & Components / Operating system package or component

libsgx-launch
Operating systems & Components / Operating system package or component

libsgx-enclave-common
Operating systems & Components / Operating system package or component

libsgx-aesm-quote-ex-plugin
Operating systems & Components / Operating system package or component

libsgx-epid-devel
Operating systems & Components / Operating system package or component

libsgx-ra-network
Operating systems & Components / Operating system package or component

libsgx-uae-service
Operating systems & Components / Operating system package or component

libsgx-quote-ex
Operating systems & Components / Operating system package or component

sgxsdk
Operating systems & Components / Operating system package or component

libsgx-enclave-common-devel
Operating systems & Components / Operating system package or component

libsgx-aesm-launch-plugin
Operating systems & Components / Operating system package or component

sgx-aesm-service
Operating systems & Components / Operating system package or component

libsgx-launch-devel
Operating systems & Components / Operating system package or component

libsgx-dcap-ql
Operating systems & Components / Operating system package or component

linux-sgx
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) OS Command Injection

EUVDB-ID: #VU64559

Risk: Medium

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-2068

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the c_rehash script distributed by some operating systems. A remote attacker with ability to pass data to c_rehash script can and execute arbitrary OS commands with the privileges of the script.

The vulnerability exists due to incomplete fix for #VU62765 (CVE-2022-1292).

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

libsgx-aesm-ecdsa-plugin: before 2.11.100-11

sgx-ra-service: before 2.11.100-11

sgx-dcap-pccs: before 2.11.100-11

libsgx-ae-qve: before 2.11.100-11

libsgx-qe3-logic: before 2.11.100-11

libsgx-ae-le: before 2.11.100-11

libsgx-dcap-default-qpl-devel: before 2.11.100-11

libsgx-ra-uefi-devel: before 2.11.100-11

libsgx-ae-pce: before 2.11.100-11

libsgx-pce-logic: before 2.11.100-11

libsgx-dcap-default-qpl: before 2.11.100-11

libsgx-ae-qe3: before 2.11.100-11

libsgx-aesm-pce-plugin: before 2.11.100-11

libsgx-epid: before 2.11.100-11

sgx-pck-id-retrieval-tool: before 2.11.100-11

libsgx-ra-uefi: before 2.11.100-11

libsgx-dcap-quote-verify-devel: before 2.11.100-11

libsgx-dcap-ql-devel: before 2.11.100-11

linux-sgx-debugsource: before 2.11.100-11

linux-sgx-debuginfo: before 2.11.100-11

libsgx-aesm-epid-plugin: before 2.11.100-11

libsgx-urts: before 2.11.100-11

libsgx-ae-epid: before 2.11.100-11

libsgx-quote-ex-devel: before 2.11.100-11

libsgx-dcap-quote-verify: before 2.11.100-11

libsgx-ra-network-devel: before 2.11.100-11

libsgx-launch: before 2.11.100-11

libsgx-enclave-common: before 2.11.100-11

libsgx-aesm-quote-ex-plugin: before 2.11.100-11

libsgx-epid-devel: before 2.11.100-11

libsgx-ra-network: before 2.11.100-11

libsgx-uae-service: before 2.11.100-11

libsgx-quote-ex: before 2.11.100-11

sgxsdk: before 2.11.100-11

libsgx-enclave-common-devel: before 2.11.100-11

libsgx-aesm-launch-plugin: before 2.11.100-11

sgx-aesm-service: before 2.11.100-11

libsgx-launch-devel: before 2.11.100-11

libsgx-dcap-ql: before 2.11.100-11

linux-sgx: before 2.11.100-11

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1899


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Missing Encryption of Sensitive Data

EUVDB-ID: #VU64922

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-2097

CWE-ID: CWE-311 - Missing Encryption of Sensitive Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to an error in AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation. Under specific circumstances OpenSSL does not encrypt the entire message and can reveal sixteen bytes of data that was preexisting in the memory that wasn't written. A remote attacker can gain access to potentially sensitive information.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

libsgx-aesm-ecdsa-plugin: before 2.11.100-11

sgx-ra-service: before 2.11.100-11

sgx-dcap-pccs: before 2.11.100-11

libsgx-ae-qve: before 2.11.100-11

libsgx-qe3-logic: before 2.11.100-11

libsgx-ae-le: before 2.11.100-11

libsgx-dcap-default-qpl-devel: before 2.11.100-11

libsgx-ra-uefi-devel: before 2.11.100-11

libsgx-ae-pce: before 2.11.100-11

libsgx-pce-logic: before 2.11.100-11

libsgx-dcap-default-qpl: before 2.11.100-11

libsgx-ae-qe3: before 2.11.100-11

libsgx-aesm-pce-plugin: before 2.11.100-11

libsgx-epid: before 2.11.100-11

sgx-pck-id-retrieval-tool: before 2.11.100-11

libsgx-ra-uefi: before 2.11.100-11

libsgx-dcap-quote-verify-devel: before 2.11.100-11

libsgx-dcap-ql-devel: before 2.11.100-11

linux-sgx-debugsource: before 2.11.100-11

linux-sgx-debuginfo: before 2.11.100-11

libsgx-aesm-epid-plugin: before 2.11.100-11

libsgx-urts: before 2.11.100-11

libsgx-ae-epid: before 2.11.100-11

libsgx-quote-ex-devel: before 2.11.100-11

libsgx-dcap-quote-verify: before 2.11.100-11

libsgx-ra-network-devel: before 2.11.100-11

libsgx-launch: before 2.11.100-11

libsgx-enclave-common: before 2.11.100-11

libsgx-aesm-quote-ex-plugin: before 2.11.100-11

libsgx-epid-devel: before 2.11.100-11

libsgx-ra-network: before 2.11.100-11

libsgx-uae-service: before 2.11.100-11

libsgx-quote-ex: before 2.11.100-11

sgxsdk: before 2.11.100-11

libsgx-enclave-common-devel: before 2.11.100-11

libsgx-aesm-launch-plugin: before 2.11.100-11

sgx-aesm-service: before 2.11.100-11

libsgx-launch-devel: before 2.11.100-11

libsgx-dcap-ql: before 2.11.100-11

linux-sgx: before 2.11.100-11

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1899


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) OS Command Injection

EUVDB-ID: #VU62765

Risk: Medium

CVSSv4.0: 8.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2022-1292

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the c_rehash script distributed by some operating systems. A remote attacker with ability to pass data to c_rehash script can and execute arbitrary OS commands with the privileges of the script.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

libsgx-aesm-ecdsa-plugin: before 2.11.100-11

sgx-ra-service: before 2.11.100-11

sgx-dcap-pccs: before 2.11.100-11

libsgx-ae-qve: before 2.11.100-11

libsgx-qe3-logic: before 2.11.100-11

libsgx-ae-le: before 2.11.100-11

libsgx-dcap-default-qpl-devel: before 2.11.100-11

libsgx-ra-uefi-devel: before 2.11.100-11

libsgx-ae-pce: before 2.11.100-11

libsgx-pce-logic: before 2.11.100-11

libsgx-dcap-default-qpl: before 2.11.100-11

libsgx-ae-qe3: before 2.11.100-11

libsgx-aesm-pce-plugin: before 2.11.100-11

libsgx-epid: before 2.11.100-11

sgx-pck-id-retrieval-tool: before 2.11.100-11

libsgx-ra-uefi: before 2.11.100-11

libsgx-dcap-quote-verify-devel: before 2.11.100-11

libsgx-dcap-ql-devel: before 2.11.100-11

linux-sgx-debugsource: before 2.11.100-11

linux-sgx-debuginfo: before 2.11.100-11

libsgx-aesm-epid-plugin: before 2.11.100-11

libsgx-urts: before 2.11.100-11

libsgx-ae-epid: before 2.11.100-11

libsgx-quote-ex-devel: before 2.11.100-11

libsgx-dcap-quote-verify: before 2.11.100-11

libsgx-ra-network-devel: before 2.11.100-11

libsgx-launch: before 2.11.100-11

libsgx-enclave-common: before 2.11.100-11

libsgx-aesm-quote-ex-plugin: before 2.11.100-11

libsgx-epid-devel: before 2.11.100-11

libsgx-ra-network: before 2.11.100-11

libsgx-uae-service: before 2.11.100-11

libsgx-quote-ex: before 2.11.100-11

sgxsdk: before 2.11.100-11

libsgx-enclave-common-devel: before 2.11.100-11

libsgx-aesm-launch-plugin: before 2.11.100-11

sgx-aesm-service: before 2.11.100-11

libsgx-launch-devel: before 2.11.100-11

libsgx-dcap-ql: before 2.11.100-11

linux-sgx: before 2.11.100-11

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1899


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###