Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-42895 CVE-2022-42896 |
CWE-ID | CWE-824 CWE-416 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
openEuler Operating systems & Components / Operating system perf Operating systems & Components / Operating system package or component kernel-tools-devel Operating systems & Components / Operating system package or component bpftool Operating systems & Components / Operating system package or component python3-perf Operating systems & Components / Operating system package or component perf-debuginfo Operating systems & Components / Operating system package or component python2-perf Operating systems & Components / Operating system package or component bpftool-debuginfo Operating systems & Components / Operating system package or component python3-perf-debuginfo Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component python2-perf-debuginfo Operating systems & Components / Operating system package or component kernel-debuginfo Operating systems & Components / Operating system package or component kernel-tools-debuginfo Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-tools Operating systems & Components / Operating system package or component kernel-debugsource Operating systems & Components / Operating system package or component kernel Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU69796
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-42895
CWE-ID:
CWE-824 - Access of Uninitialized Pointer
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due to unauthorized access of uninitialized pointer within the l2cap_parse_conf_req() function in net/bluetooth/l2cap_core.c. An attacker with physical proximity to the affected device can gain access to sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 22.03 LTS
perf: before 4.19.90-2211.5.0.0178
kernel-tools-devel: before 4.19.90-2211.5.0.0178
bpftool: before 4.19.90-2211.5.0.0178
python3-perf: before 4.19.90-2211.5.0.0178
perf-debuginfo: before 4.19.90-2211.5.0.0178
python2-perf: before 4.19.90-2211.5.0.0178
bpftool-debuginfo: before 4.19.90-2211.5.0.0178
python3-perf-debuginfo: before 4.19.90-2211.5.0.0178
kernel-devel: before 4.19.90-2211.5.0.0178
python2-perf-debuginfo: before 4.19.90-2211.5.0.0178
kernel-debuginfo: before 4.19.90-2211.5.0.0178
kernel-tools-debuginfo: before 4.19.90-2211.5.0.0178
kernel-source: before 4.19.90-2211.5.0.0178
kernel-tools: before 4.19.90-2211.5.0.0178
kernel-debugsource: before 4.19.90-2211.5.0.0178
kernel: before 4.19.90-2211.5.0.0178
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2117
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69795
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-42896
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows an attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the l2cap_connect() and l2cap_le_connect_req() function in net/bluetooth/l2cap_core.c. An attacker with physical proximity to the affected device can trigger a use-after-free error and execute arbitrary code on the system.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 22.03 LTS
perf: before 4.19.90-2211.5.0.0178
kernel-tools-devel: before 4.19.90-2211.5.0.0178
bpftool: before 4.19.90-2211.5.0.0178
python3-perf: before 4.19.90-2211.5.0.0178
perf-debuginfo: before 4.19.90-2211.5.0.0178
python2-perf: before 4.19.90-2211.5.0.0178
bpftool-debuginfo: before 4.19.90-2211.5.0.0178
python3-perf-debuginfo: before 4.19.90-2211.5.0.0178
kernel-devel: before 4.19.90-2211.5.0.0178
python2-perf-debuginfo: before 4.19.90-2211.5.0.0178
kernel-debuginfo: before 4.19.90-2211.5.0.0178
kernel-tools-debuginfo: before 4.19.90-2211.5.0.0178
kernel-source: before 4.19.90-2211.5.0.0178
kernel-tools: before 4.19.90-2211.5.0.0178
kernel-debugsource: before 4.19.90-2211.5.0.0178
kernel: before 4.19.90-2211.5.0.0178
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2117
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.