Filtered by vendor Openatom
Subscriptions
Total
134 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-27242 | 1 Openatom | 1 Openharmony | 2025-06-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. | ||||
CVE-2025-27247 | 1 Openatom | 1 Openharmony | 2025-06-09 | 5.5 Medium |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | ||||
CVE-2025-27563 | 1 Openatom | 1 Openharmony | 2025-06-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | ||||
CVE-2023-47857 | 1 Openatom | 1 Openharmony | 2025-06-03 | 4 Medium |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer. | ||||
CVE-2022-41686 | 2 Openatom, Openharmony | 2 Openharmony, Openharmony | 2025-05-14 | 5.1 Medium |
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption. | ||||
CVE-2025-27132 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.8 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2025-27241 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | ||||
CVE-2025-27248 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | ||||
CVE-2025-22886 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. | ||||
CVE-2025-25052 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow. | ||||
CVE-2025-25218 | 1 Openatom | 1 Openharmony | 2025-05-09 | 3.3 Low |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | ||||
CVE-2021-33630 | 2 Openatom, Redhat | 2 Openeuler, Enterprise Linux | 2025-05-07 | 5.5 Medium |
NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C. This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3. | ||||
CVE-2024-0285 | 1 Openatom | 1 Openharmony | 2025-05-07 | 4.7 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input. | ||||
CVE-2023-47216 | 1 Openatom | 1 Openharmony | 2025-04-17 | 2.9 Low |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources | ||||
CVE-2021-33640 | 2 Fedoraproject, Openatom | 2 Fedora, Openeuler | 2025-04-17 | 6.2 Medium |
After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free). | ||||
CVE-2022-43662 | 2 Openatom, Openharmony | 2 Openharmony, Openharmony | 2025-04-09 | 4 Medium |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | ||||
CVE-2023-0035 | 1 Openatom | 1 Openharmony | 2025-04-09 | 6.5 Medium |
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. | ||||
CVE-2022-45126 | 2 Openatom, Openharmony | 2 Openharmony, Openharmony | 2025-04-09 | 4 Medium |
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | ||||
CVE-2023-0036 | 1 Openatom | 1 Openharmony | 2025-04-09 | 6.5 Medium |
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege. | ||||
CVE-2021-33644 | 4 Fedoraproject, Feep, Openatom and 1 more | 4 Fedora, Libtar, Openeuler and 1 more | 2025-04-02 | 8.1 High |
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. |