Vulnerability Description
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openharmony | Openharmony | >= 3.1.0, <= 3.1.4 |
| Openatom | Openharmony | >= 1.1.0, <= 1.1.5 |
Related Weaknesses (CWE)
References
- https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2Third Party Advisory
- https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2Third Party Advisory
FAQ
What is CVE-2022-43662?
CVE-2022-43662 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied ...
How severe is CVE-2022-43662?
CVE-2022-43662 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43662?
Check the references section above for vendor advisories and patch information. Affected products include: Openharmony Openharmony, Openatom Openharmony.