OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
References
Link | Resource |
---|---|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md | Third Party Advisory |
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.1 |
09 Sep 2024, 12:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openatom
Openatom openharmony |
|
CPE | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* |
Information
Published : 2022-10-14 15:16
Updated : 2024-11-21 07:23
NVD link : CVE-2022-41686
Mitre link : CVE-2022-41686
CVE.ORG link : CVE-2022-41686
JSON object : View
Products Affected
openharmony
- openharmony
openatom
- openharmony