First published: Fri Mar 10 2023(Updated: )
The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
Credit: scy@openharmony.io scy@openharmony.io
Affected Software | Affected Version | How to fix |
---|---|---|
Openharmony Openharmony | >=3.1<=3.1.5 | |
Openatom Openharmony | >=3.1<=3.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-22436.
The severity of CVE-2023-22436 is high.
OpenHarmony versions 3.1.5 and prior are affected by CVE-2023-22436.
CVE-2023-22436 allows local attackers to exploit a use-after-free (UAF) vulnerability, leading to privilege escalation to root.
At the time of this advisory, there is no known fix available for CVE-2023-22436. It is recommended to follow the provided reference for further updates and mitigation measures.