CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer. |
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. |
NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C.
This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3. |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input. |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources
|
After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free). |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. |
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
|
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. |
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
|
The th_read() function doesn’t free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak. |