Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Openharmony
(Openatom)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 111 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-12-03 | CVE-2024-9978 | in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read. | Openharmony | 5.5 | ||
2024-12-03 | CVE-2024-10074 | in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free. | Openharmony | 7.8 | ||
2022-09-09 | CVE-2022-36423 | OpenHarmony-v3.1.2 and prior versions have an incorrect configuration of the cJSON library, which leads a Stack overflow vulnerability during recursive parsing. LAN attackers can lead a DoS attack to all network devices. | Openharmony, Openharmony | 7.4 | ||
2022-09-09 | CVE-2022-38701 | OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information. | Openharmony, Openharmony | 3.3 | ||
2022-10-14 | CVE-2022-41686 | OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption. | Openharmony, Openharmony | 4.4 | ||
2022-12-08 | CVE-2022-41802 | Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | Openharmony, Openharmony | 3.3 | ||
2022-12-08 | CVE-2022-44455 | The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash. | Openharmony, Openharmony | 7.8 | ||
2023-01-09 | CVE-2022-43662 | Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | Openharmony, Openharmony | 7.8 | ||
2023-01-09 | CVE-2022-45126 | Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | Openharmony, Openharmony | 7.8 | ||
2023-01-09 | CVE-2023-0035 | softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. | Openharmony | 7.8 |