Description
The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an
UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26598 | The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root. |
References
History
Tue, 04 Mar 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Sep 2024 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openatom
Openatom openharmony |
|
| CPEs | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* | |
| Vendors & Products |
Openharmony
Openharmony openharmony |
Openatom
Openatom openharmony |
Status: PUBLISHED
Assigner: OpenHarmony
Published:
Updated: 2025-03-04T21:18:11.431Z
Reserved: 2023-01-05T12:23:16.628Z
Link: CVE-2023-22436
Updated: 2024-08-02T10:07:06.546Z
Status : Modified
Published: 2023-03-10T11:15:12.220
Modified: 2024-11-21T07:44:48.087
Link: CVE-2023-22436
No data.
OpenCVE Enrichment
No data.
EUVD