in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow.
References
Link | Resource |
---|---|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md | Third Party Advisory |
Configurations
History
11 Feb 2025, 17:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openatom openharmony
Openatom |
|
References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md - Third Party Advisory | |
CPE | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* | |
Summary |
|
07 Feb 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-07 10:15
Updated : 2025-02-11 17:25
NVD link : CVE-2025-0303
Mitre link : CVE-2025-0303
CVE.ORG link : CVE-2025-0303
JSON object : View
Products Affected
openatom
- openharmony
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')