First published: Thu Dec 08 2022(Updated: )
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=1.1.0<=1.1.5 | |
Openharmony Openharmony | >=3.0<=3.0.6 | |
Openharmony Openharmony | >=3.1<=3.1.4 | |
Openatom Openharmony | >=1.1.0<=1.1.5 | |
Openatom Openharmony | >=3.0<=3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41802 is a vulnerability in the kernel subsystem within OpenHarmony-v3.1.4 and prior versions.
The severity of CVE-2022-41802 is medium, with a severity value of 3.3.
CVE-2022-41802 affects OpenHarmony versions 1.1.0 to 1.1.5, 3.0 to 3.0.6, and 3.1 to 3.1.4.
CVE-2022-41802 is a kernel stack overflow vulnerability in the OpenHarmony kernel_liteos_a subsystem when calling SysClockGetres.
Currently, there is no fix available for CVE-2022-41802. It is recommended to follow the security advisory from OpenHarmony for updates.