First published: Mon Jan 09 2023(Updated: )
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=1.1.0<=1.1.5 | |
Openharmony Openharmony | >=3.0<=3.0.6 | |
Openharmony Openharmony | >=3.1.0<=3.1.4 | |
>=3.1.0<=3.1.4 | ||
>=1.1.0<=1.1.5 | ||
>=3.0<=3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45126 is a kernel stack overflow vulnerability in the OpenHarmony-v3.1.4 and prior versions of kernel_liteos_a when calling SysClockGettime.
CVE-2022-45126 has a severity rating of 7.8 (high).
OpenHarmony versions 1.1.0 to 1.1.5, 3.0 to 3.0.6, and 3.1.0 to 3.1.4 are affected by CVE-2022-45126.
CVE-2022-45126 is associated with CWE IDs 787 and 120.
To fix CVE-2022-45126, update to the latest version of OpenHarmony that includes the necessary security patches.