First published: Fri Oct 14 2022(Updated: )
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=3.0<=3.0.6 | |
Openharmony Openharmony | >=3.1<=3.1.2 | |
Openatom Openharmony | >=3.1<=3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41686 is a vulnerability in OpenHarmony-v3.1.2 and prior versions, as well as 3.0.6 and prior versions, that allows for an out-of-bound memory read and write in the /dev/mmz_userdev device driver.
The impact of CVE-2022-41686 depends on the attacker's privileges, as an unprivileged process on the device could read out-of-bound memory, potentially leading to sensitive information disclosure.
The severity of CVE-2022-41686 is medium, with a CVSS score of 4.4.
To fix CVE-2022-41686, users should update to OpenHarmony version 3.1.3 or later, or version 3.0.7 or later, which contain the necessary patches and fixes for this vulnerability.
More information about CVE-2022-41686 can be found at the following reference: https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-10.md