in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference.
References
Link | Resource |
---|---|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md | Vendor Advisory |
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md | Vendor Advisory |
Configurations
History
02 Jan 2025, 19:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:* | |
References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md - Vendor Advisory | |
First Time |
Openatom
Openatom openharmony |
21 Nov 2024, 08:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md - |
07 May 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-07 07:15
Updated : 2025-01-02 19:07
NVD link : CVE-2024-23808
Mitre link : CVE-2024-23808
CVE.ORG link : CVE-2024-23808
JSON object : View
Products Affected
openatom
- openharmony