openEuler update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2022-42895
CVE-2022-42896
CWE-ID CWE-824
CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

perf
Operating systems & Components / Operating system package or component

kernel-tools-devel
Operating systems & Components / Operating system package or component

bpftool
Operating systems & Components / Operating system package or component

python3-perf
Operating systems & Components / Operating system package or component

perf-debuginfo
Operating systems & Components / Operating system package or component

python2-perf
Operating systems & Components / Operating system package or component

bpftool-debuginfo
Operating systems & Components / Operating system package or component

python3-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

python2-perf-debuginfo
Operating systems & Components / Operating system package or component

kernel-debuginfo
Operating systems & Components / Operating system package or component

kernel-tools-debuginfo
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-tools
Operating systems & Components / Operating system package or component

kernel-debugsource
Operating systems & Components / Operating system package or component

kernel
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Access of Uninitialized Pointer

EUVDB-ID: #VU69796

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-42895

CWE-ID: CWE-824 - Access of Uninitialized Pointer

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to unauthorized access of uninitialized pointer within the l2cap_parse_conf_req() function in net/bluetooth/l2cap_core.c. An attacker with physical proximity to the affected device can gain access to sensitive information.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

perf: before 4.19.90-2211.5.0.0178

kernel-tools-devel: before 4.19.90-2211.5.0.0178

bpftool: before 4.19.90-2211.5.0.0178

python3-perf: before 4.19.90-2211.5.0.0178

perf-debuginfo: before 4.19.90-2211.5.0.0178

python2-perf: before 4.19.90-2211.5.0.0178

bpftool-debuginfo: before 4.19.90-2211.5.0.0178

python3-perf-debuginfo: before 4.19.90-2211.5.0.0178

kernel-devel: before 4.19.90-2211.5.0.0178

python2-perf-debuginfo: before 4.19.90-2211.5.0.0178

kernel-debuginfo: before 4.19.90-2211.5.0.0178

kernel-tools-debuginfo: before 4.19.90-2211.5.0.0178

kernel-source: before 4.19.90-2211.5.0.0178

kernel-tools: before 4.19.90-2211.5.0.0178

kernel-debugsource: before 4.19.90-2211.5.0.0178

kernel: before 4.19.90-2211.5.0.0178

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2117


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU69795

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-42896

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows an attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the l2cap_connect() and l2cap_le_connect_req() function in net/bluetooth/l2cap_core.c. An attacker with physical proximity to the affected device can trigger a use-after-free error and execute arbitrary code on the system.


Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 22.03 LTS

perf: before 4.19.90-2211.5.0.0178

kernel-tools-devel: before 4.19.90-2211.5.0.0178

bpftool: before 4.19.90-2211.5.0.0178

python3-perf: before 4.19.90-2211.5.0.0178

perf-debuginfo: before 4.19.90-2211.5.0.0178

python2-perf: before 4.19.90-2211.5.0.0178

bpftool-debuginfo: before 4.19.90-2211.5.0.0178

python3-perf-debuginfo: before 4.19.90-2211.5.0.0178

kernel-devel: before 4.19.90-2211.5.0.0178

python2-perf-debuginfo: before 4.19.90-2211.5.0.0178

kernel-debuginfo: before 4.19.90-2211.5.0.0178

kernel-tools-debuginfo: before 4.19.90-2211.5.0.0178

kernel-source: before 4.19.90-2211.5.0.0178

kernel-tools: before 4.19.90-2211.5.0.0178

kernel-debugsource: before 4.19.90-2211.5.0.0178

kernel: before 4.19.90-2211.5.0.0178

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2117


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###