
CVE-2022-43662 – Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime.
https://notcve.org/view.php?id=CVE-2022-43662
09 Jan 2023 — Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysTimerGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectament... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-45126 – Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime.
https://notcve.org/view.php?id=CVE-2022-45126
09 Jan 2023 — Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGettime. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectament... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-44455 – The appspawn and nwebspawn services were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation.
https://notcve.org/view.php?id=CVE-2022-44455
08 Dec 2022 — The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash. Se descubrió que los servicios appspawn y nwebspawn dentro de OpenHarmony-v3.1.2 y versiones anteriores eran vulnerables a la vulnerabilidad de desbordamiento de búfer debido a una v... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-45118 – Telephony in communication subsystem sends public events with personal data, but the permission is not set.
https://notcve.org/view.php?id=CVE-2022-45118
08 Dec 2022 — OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions. OpenHarmony-v3.1.2 y versiones anteriores tenían la vulnerabilidad de que la telefonía en el subsistema de comunicación envía eventos públicos con datos personales, pero el permiso no está establecido. Las aplicacion... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-276: Incorrect Default Permissions CWE-287: Improper Authentication •

CVE-2022-45877 – PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.
https://notcve.org/view.php?id=CVE-2022-45877
08 Dec 2022 — OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks. • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-287: Improper Authentication CWE-319: Cleartext Transmission of Sensitive Information •

CVE-2022-41802 – Kernel subsystem in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres.
https://notcve.org/view.php?id=CVE-2022-41802
08 Dec 2022 — Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. El subsistema del kernel dentro de OpenHarmony-v3.1.4 y versiones anteriores en kernel_liteos_a tiene una vulnerabilidad de desbordamiento de la pila del kernel cuando se llama a SysClockGetres. Los datos de relleno de 4 bytes de la pila del kernel se copian incorrectamente ... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-43495 – An abnormal packet recieved when distributedhardware_device_manager joining a network could cause a device reboot.
https://notcve.org/view.php?id=CVE-2022-43495
03 Nov 2022 — OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot. OpenHarmony-v3.1.2 y versiones anteriores tenían una vulnerabilidad de DOS en distributedhardware_device_manager al unirse a una red. Los atacantes de red pueden enviar un paquete anormal al unirse a una red, provocar una referencia nullptr y reiniciar el dispositivo. • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md • CWE-476: NULL Pointer Dereference •

CVE-2022-43449 – Arbitrary file read via download_server.
https://notcve.org/view.php?id=CVE-2022-43449
03 Nov 2022 — OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000. OpenHarmony-v3.1.2 y versiones anteriores tenían una vulnerabilidad de lectura de archivos arbitraria a través del servidor de descarga. Los atacantes locales pueden instalar una aplicación maliciosa en el dispositivo y revelar cualqu... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md • CWE-20: Improper Input Validation CWE-552: Files or Directories Accessible to External Parties •

CVE-2022-43451 – Multiple path traversal in appspawn and nwebspawn services.
https://notcve.org/view.php?id=CVE-2022-43451
03 Nov 2022 — OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges. OpenHarmony-v3.1.2 y versiones anteriores tenían una vulnerabilidad de Multiple path traversal en los servicios appspawn y nwebspawn. Los atacantes locales pueden crear directorios arbitrarios o escapar de l... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-11.md • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-287: Improper Authentication •

CVE-2022-42464 – Kernel memory pool override in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in furth ...
https://notcve.org/view.php?id=CVE-2022-42464
14 Oct 2022 — OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have a Kernel memory pool override vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could disclose sensitive information including kernel pointer, which could be used in further attacks. The processes with system user UID run on the device would be able to mmap memory pools used by kernel and override them which could be used to gain kernel code exe... • https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md • CWE-276: Incorrect Default Permissions •