Filtered by vendor Openatom
Subscriptions
Total
113 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-41686 | 2 Openatom, Openharmony | 2 Openharmony, Openharmony | 2025-05-14 | 5.1 Medium |
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption. | ||||
CVE-2025-27132 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.8 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2025-27241 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | ||||
CVE-2025-27248 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | ||||
CVE-2025-22886 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. | ||||
CVE-2025-25052 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow. | ||||
CVE-2025-25218 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | ||||
CVE-2021-33630 | 2 Openatom, Redhat | 2 Openeuler, Enterprise Linux | 2025-05-07 | 5.5 Medium |
NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C. This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3. | ||||
CVE-2024-0285 | 1 Openatom | 1 Openharmony | 2025-05-07 | 4.7 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input. | ||||
CVE-2023-47216 | 1 Openatom | 1 Openharmony | 2025-04-17 | 2.9 Low |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources | ||||
CVE-2021-33640 | 2 Fedoraproject, Openatom | 2 Fedora, Openeuler | 2025-04-17 | 6.2 Medium |
After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free). | ||||
CVE-2022-43662 | 2 Openatom, Openharmony | 2 Openharmony, Openharmony | 2025-04-09 | 4 Medium |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | ||||
CVE-2023-0035 | 1 Openatom | 1 Openharmony | 2025-04-09 | 6.5 Medium |
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. | ||||
CVE-2022-45126 | 2 Openatom, Openharmony | 2 Openharmony, Openharmony | 2025-04-09 | 4 Medium |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | ||||
CVE-2023-0036 | 1 Openatom | 1 Openharmony | 2025-04-09 | 6.5 Medium |
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. | ||||
CVE-2021-33644 | 4 Fedoraproject, Feep, Openatom and 1 more | 4 Fedora, Libtar, Openeuler and 1 more | 2025-04-02 | 8.1 High |
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. | ||||
CVE-2021-33643 | 4 Fedoraproject, Feep, Openatom and 1 more | 4 Fedora, Libtar, Openeuler and 1 more | 2025-04-02 | 9.1 Critical |
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read. | ||||
CVE-2021-33658 | 2 Huawei, Openatom | 2 Atune, Openeuler | 2025-04-02 | 7.8 High |
atune before 0.3-0.8 log in as a local user and run the curl command to access the local atune url interface to escalate the local privilege or modify any file. Authentication is not forcibly enabled in the default configuration. | ||||
CVE-2021-33656 | 4 Debian, Linux, Openatom and 1 more | 6 Debian Linux, Linux Kernel, Openeuler and 3 more | 2025-04-02 | 6.8 Medium |
When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds. | ||||
CVE-2021-33631 | 2 Openatom, Redhat | 5 Openeuler, Enterprise Linux, Logging and 2 more | 2025-04-02 | 5.5 Medium |
Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0. |