in OpenHarmony v4.1.0 allow a local attacker with high privileges arbitrary code execution in pre-installed apps through use after free.
                
            References
                    | Link | Resource | 
|---|---|
| https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md | Third Party Advisory | 
Configurations
                    History
                    16 Oct 2024, 16:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-10.md - Third Party Advisory | |
| First Time | Openatom Openatom openharmony | |
| CPE | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.7 | 
10 Oct 2024, 12:57
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
08 Oct 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-10-08 04:15
Updated : 2024-10-16 16:53
NVD link : CVE-2024-39831
Mitre link : CVE-2024-39831
CVE.ORG link : CVE-2024-39831
JSON object : View
Products Affected
                openatom
- openharmony
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
