
CVE-2023-25947 – The bundle management subsystem has a improper input validation when installing a HAP package.
https://notcve.org/view.php?id=CVE-2023-25947
10 Mar 2023 — The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package. The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package. • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md • CWE-20: Improper Input Validation CWE-476: NULL Pointer Dereference •

CVE-2023-24465 – Communication Wi-Fi subsystem has a null pointer reference vulnerability when receving external data.
https://notcve.org/view.php?id=CVE-2023-24465
10 Mar 2023 — Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash. Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash. • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md • CWE-20: Improper Input Validation CWE-476: NULL Pointer Dereference •

CVE-2023-22436 – The kernel subsystem function check_permission_for_set_tokenid has an UAF vulnerability.
https://notcve.org/view.php?id=CVE-2023-22436
10 Mar 2023 — The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root. The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root. • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md • CWE-190: Integer Overflow or Wraparound CWE-416: Use After Free •

CVE-2023-22301 – The kernel subsystem hmdfs has a arbitrary memory accessing vulnerability.
https://notcve.org/view.php?id=CVE-2023-22301
10 Mar 2023 — The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions has an arbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system. The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions has an arbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system. • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md • CWE-20: Improper Input Validation •

CVE-2023-0083 – The ArkUI framework subsystem doesn't check the input parameter,causing type confusion and invalid memory access.
https://notcve.org/view.php?id=CVE-2023-0083
10 Mar 2023 — The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, OpenHarmony-v3.0.7 and prior versions has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash. • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2023-0036 – platform_callback_stub in misc subsystem has an authentication bypass vulnerability which allows an "SA relay attack".
https://notcve.org/view.php?id=CVE-2023-0036
09 Jan 2023 — platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. platform_callback_stub en el subsistema misceláneo dentro de OpenHarmony-v3.0.5 y versiones anteriores tiene una vulnerabilidad de omisión de autenticación que permite un "SA relay attack". Los atacantes locales pueden omitir la autenticación y atacar a otras SA co... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md • CWE-287: Improper Authentication CWE-294: Authentication Bypass by Capture-replay •

CVE-2023-0035 – softbus_client_stub in communication subsystem has an authentication bypass vulnerability which allows an "SA relay attack".
https://notcve.org/view.php?id=CVE-2023-0035
09 Jan 2023 — softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. softbus_client_stub en el subsistema de comunicación dentro de OpenHarmony-v3.0.5 y versiones anteriores tiene una vulnerabilidad de omisión de autenticación que permite un "SA relay attack". Los atacantes locales pueden omitir la autenticación y atacar a otr... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-01.md • CWE-287: Improper Authentication CWE-294: Authentication Bypass by Capture-replay •

CVE-2022-43662 – Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime.
https://notcve.org/view.php?id=CVE-2022-43662
09 Jan 2023 — Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysTimerGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectament... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-45126 – Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime.
https://notcve.org/view.php?id=CVE-2022-45126
09 Jan 2023 — Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectament... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-41802 – Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres.
https://notcve.org/view.php?id=CVE-2022-41802
08 Dec 2022 — Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGetres. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente ... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •