First published: Mon Jan 09 2023(Updated: )
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=1.1.0<=1.1.5 | |
Openharmony Openharmony | >=3.0<=3.0.6 | |
Openharmony Openharmony | >=3.1.0<=3.1.4 | |
>=3.1.0<=3.1.4 | ||
>=1.1.0<=1.1.5 | ||
>=3.0<=3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2022-43662 is a kernel stack overflow vulnerability in the OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a.
Vulnerability CVE-2022-43662 has a severity rating of 7.8 (high severity).
The affected software for vulnerability CVE-2022-43662 includes OpenHarmony versions 1.1.0 to 1.1.5, 3.0 to 3.0.6, and 3.1.0 to 3.1.4.
To fix vulnerability CVE-2022-43662, update OpenHarmony to a version that is not affected by the vulnerability.
More information about vulnerability CVE-2022-43662 can be found at the following link: [link](https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md)