Filtered by vendor Openatom
Subscriptions
Total
134 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-33646 | 4 Fedoraproject, Feep, Openatom and 1 more | 4 Fedora, Libtar, Openeuler and 1 more | 2025-04-02 | 7.5 High |
The th_read() function doesn’t free a variable t->th_buf.gnu_longname after allocating memory, which may cause a memory leak. | ||||
CVE-2021-33631 | 2 Openatom, Redhat | 5 Openeuler, Enterprise Linux, Logging and 2 more | 2025-04-02 | 5.5 Medium |
Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0. | ||||
CVE-2021-33656 | 4 Debian, Linux, Openatom and 1 more | 6 Debian Linux, Linux Kernel, Openeuler and 3 more | 2025-04-02 | 6.8 Medium |
When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds. | ||||
CVE-2021-33645 | 4 Fedoraproject, Feep, Openatom and 1 more | 4 Fedora, Libtar, Openeuler and 1 more | 2025-04-02 | 7.5 High |
The th_read() function doesn’t free a variable t->th_buf.gnu_longlink after allocating memory, which may cause a memory leak. | ||||
CVE-2021-33644 | 4 Fedoraproject, Feep, Openatom and 1 more | 4 Fedora, Libtar, Openeuler and 1 more | 2025-04-02 | 8.1 High |
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read. | ||||
CVE-2021-33643 | 4 Fedoraproject, Feep, Openatom and 1 more | 4 Fedora, Libtar, Openeuler and 1 more | 2025-04-02 | 9.1 Critical |
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read. | ||||
CVE-2024-29074 | 1 Openatom | 1 Openharmony | 2025-03-12 | 6.5 Medium |
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input. | ||||
CVE-2025-0587 | 1 Openatom | 1 Openharmony | 2025-03-11 | 3.8 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2025-23414 | 1 Openatom | 1 Openharmony | 2025-03-11 | 3.8 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2025-23418 | 1 Openatom | 1 Openharmony | 2025-03-11 | 3.3 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. | ||||
CVE-2025-23420 | 1 Openatom | 1 Openharmony | 2025-03-11 | 3.8 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2025-24301 | 1 Openatom | 1 Openharmony | 2025-03-11 | 3.8 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2025-24309 | 1 Openatom | 1 Openharmony | 2025-03-11 | 3.8 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2024-24581 | 1 Openatom | 1 Openharmony | 2025-03-04 | 6.5 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write. | ||||
CVE-2023-22436 | 1 Openatom | 1 Openharmony | 2025-03-04 | 7.8 High |
The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root. | ||||
CVE-2023-24465 | 1 Openatom | 1 Openharmony | 2025-03-04 | 5.5 Medium |
Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash. | ||||
CVE-2021-33639 | 1 Openatom | 1 Openeuler Kernel | 2025-03-04 | 7.5 High |
REMAP cmd of SVM driver can be used to remap read only memory as read-write, then cause read only memory/file modified. | ||||
CVE-2025-20021 | 1 Openatom | 1 Openharmony | 2025-03-04 | 3.3 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. | ||||
CVE-2025-20081 | 1 Openatom | 1 Openharmony | 2025-03-04 | 3.8 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios. | ||||
CVE-2025-20024 | 1 Openatom | 1 Openharmony | 2025-03-04 | 3.8 Low |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios. |