The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an 
UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 04 Mar 2025 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 09 Sep 2024 12:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Openatom Openatom openharmony | |
| CPEs | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* | |
| Vendors & Products | Openharmony Openharmony openharmony | Openatom Openatom openharmony | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: OpenHarmony
Published: 2023-03-10T10:44:55.029Z
Updated: 2025-03-04T21:18:11.431Z
Reserved: 2023-01-05T12:23:16.628Z
Link: CVE-2023-22436
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T10:07:06.546Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-03-10T11:15:12.220
Modified: 2024-11-21T07:44:48.087
Link: CVE-2023-22436
 Redhat
                        Redhat
                    No data.