|OpenHarmony-SA-2021-0301 | NA | The component distributedschedule_services_samgr_lite has a permission bypass vulnerability.| This vulnerability can be exploited to bypass the authentication of system services, causing Elevation Of Privilege. |OpenHarmony-1.0|distributedschedule_services_samgr_lite| [Link](https://gitee.com/openharmony/distributedschedule_samgr_lite/pulls/7/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0302 | NA | The componet kernel_liteos_a has a DoS vulnerability. | This vulnerability can be exploited to interrupt system signals in calling application layer interface, may cause DoS attacks.|OpenHarmony-1.0|kernel_liteos_a| [Link](https://gitee.com/openharmony/kernel_liteos_a/pulls/48/files)|Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0301 | NA | The component distributedschedule_services_samgr_lite has a permission bypass vulnerability.| This vulnerability can be exploited to bypass the authentication of system services, causing Elevation Of Privilege. |OpenHarmony-1.0(master)|distributedschedule_services_samgr_lite| [master](https://gitee.com/openharmony/distributedschedule_samgr_lite/pulls/7/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0302 | NA | The componet kernel_liteos_a has a DoS vulnerability. | This vulnerability can be exploited to interrupt system signals in calling application layer interface, may cause DoS attacks.|OpenHarmony-1.0(master)|kernel_liteos_a| [master](https://gitee.com/openharmony/kernel_liteos_a/pulls/48/files)|Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0801 | NA | The component drivers_adapter_khdf_linux has an integer overflow vulnerability.| This vulnerability can be exploited to apply large memory, causing Dos attacks.|OpenHarmony_1.0.1_release|drivers_adapter_khdf_linux| [Link](https://gitee.com/openharmony/drivers_adapter_khdf_linux/pulls/28/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0801 | NA | The component drivers_adapter_khdf_linux has an integer overflow vulnerability.| This vulnerability can be exploited to apply large memory, causing Dos attacks.|OpenHarmony_release_v1.1.0<br/>OpenHarmony-v1.1.1-LTS|drivers_adapter_khdf_linux| [1.1.x](https://gitee.com/openharmony/drivers_adapter_khdf_linux/pulls/28/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0901 | NA | The component distributedschedule_samgr_lite has a UAF vulnerability.|This vulnerability can be exploited to bypass verification when calling an SA.|OpenHarmony-v2.2(Trunk)|distributedschedule_samgr_lite| [Link](https://gitee.com/openharmony/distributedschedule_samgr_lite/pulls/24/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0902 | NA | The component kernel_liteos_a has an invalid address access vulnerability.|This vulnerability can be exploited to write to illegal address in kernel, causing Remote Code Execute. |OpenHarmony-v2.2(Trunk)|kernel_liteos_a| [Link](https://gitee.com/openharmony/kernel_liteos_a/pulls/373/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0903 | NA | The component drivers_adapter has an integer overflow vulnerability.|This vulnerability can be exploited to apply large memory, causing Dos attacks.|OpenHarmony-v2.2(Trunk)|drivers_adapter| [Link](https://gitee.com/openharmony/drivers_adapter/pulls/31/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0901 | NA | The component distributedschedule_samgr_lite has a UAF vulnerability.|This vulnerability can be exploited to bypass verification when calling an SA.|OpenHarmony_release_v1.1.0<br/>OpenHarmony-v1.1.1-LTS|distributedschedule_samgr_lite| [1.1.x](https://gitee.com/openharmony/distributedschedule_samgr_lite/pulls/24/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0902 | NA | The component kernel_liteos_a has an invalid address access vulnerability.|This vulnerability can be exploited to write to illegal address in kernel, causing Remote Code Execute. |OpenHarmony_release_v1.1.0<br/>OpenHarmony-v1.1.1-LTS|kernel_liteos_a| [1.1.x](https://gitee.com/openharmony/kernel_liteos_a/pulls/373/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2021-0903 | NA | The component drivers_adapter has an integer overflow vulnerability.|This vulnerability can be exploited to apply large memory, causing Dos attacks.|OpenHarmony_release_v1.1.0<br/>OpenHarmony-v1.1.1-LTS|drivers_adapter| [1.1.x](https://gitee.com/openharmony/drivers_adapter/pulls/31/files) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0501 | NA | The softbus subsystem in OpenHarmony has a heap overflow vulnerability. | Local attackers can overwrite the memory and get system control. |OpenHarmony-3.0-LTS|communication_dsoftbus| [Link](https://gitee.com/openharmony/communication_dsoftbus/pulls/1198) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0502 | NA | The softbus subsystem in OpenHarmony has a heap overflow vulnerability when receive a tcp message. | LAN attackers can lead to remote code execution(RCE) and get system control. |OpenHarmony-3.0-LTS|communication_dsoftbus| [Link](https://gitee.com/openharmony/communication_dsoftbus/pulls/1113) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0503 | NA | The softbus subsystem in OpenHarmony has an out-of-bounds access vulnerability when handle a synchronized message from another device. | Local attackers can elevate permissions to SYSTEM. |OpenHarmony-3.0-LTS|communication_dsoftbus| [Link](https://gitee.com/openharmony/communication_dsoftbus/pulls/1369) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0504 | NA | The calss Lock in OpenHarmony has a double free vulnerability. | Local attackers can elevate permissions to SYSTEM. |OpenHarmony-3.0-LTS|global_resmgr_standard| [Link](https://gitee.com/openharmony/global_resmgr_standard/pulls/136) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0501 | NA | The softbus subsystem in OpenHarmony has a heap overflow vulnerability. | Local attackers can overwrite the memory and get system control. |OpenHarmony-3.0-LTS|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/1372) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0502 | NA | The softbus subsystem in OpenHarmony has a heap overflow vulnerability when receive a tcp message. | LAN attackers can lead to remote code execution(RCE) and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release through OpenHarmony-v3.1.1-Release|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/1369)<br/>[3.1.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/1807) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0503 | NA | The softbus subsystem in OpenHarmony has an out-of-bounds access vulnerability when handle a synchronized message from another device. | Local attackers can elevate permissions to SYSTEM. |OpenHarmony-3.0-LTS|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/1422) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0504 | NA | The calss Lock in OpenHarmony has a double free vulnerability. | Local attackers can elevate permissions to SYSTEM. |OpenHarmony-3.0-LTS|global_resource_management| [3.0.x](https://gitee.com/openharmony/global_resource_management/pulls/136) |Reported by OpenHarmony Team|
### The following table lists the third-party library vulnerabilities with only the CVE, severity, and affected OpenHarmony versions provided. For more details, see the security bulletins released by third-parties.
| CVE-2022-0516 | High | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/8ba71b83e7acfbbf351d3d5b10ced7a4f66c05c9) |
| CVE-2022-0617 | Medium | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/999c29733c45ac8864c64aa8b4b98df436327096)<br/>[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/7d65b9dbe4277bac42eb649935cd02fdcd47cfe0) |
| CVE-2022-0847 | High | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/b4e786c8ebae053b21583494b44f97e30b58ec3d) |
| CVE-2022-26490 | High | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/141) |
| CVE-2022-25636 | High | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/62e6212596777900936105d7dbc18ed2303026c0) |
| CVE-2022-26966 | Medium | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/4b80b2d8eba4d9df430b5b19096299b017541e1d) |
| CVE-2022-1011 | High | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/013bad7096d7bee6a3beb0936060e07644fc251d) |
| CVE-2022-27223 | High | OpenHarmony-3.0-LTS |[Link](https://gitee.com/openharmony/kernel_linux_5.10/commit/5939446d63ddecefdbe31834c2ee00c5bc0514e2) |
| CVE-2022-0778 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/third_party_openssl/pulls/34) |
| CVE-2018-25032 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v1.1.0 through OpenHarmony-v1.1.4-LTS |[3.0.x](https://gitee.com/openharmony/third_party_zlib/pulls/30)<br/>[1.1.x](https://gitee.com/openharmony/third_party_zlib/pulls/31) |
| CVE-2021-28714 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/06639c05f98d596690a93b4179235f709fbdfffe) |
| CVE-2021-28715 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/2938e8ac18d248567afe744760db99c77aff2253) |
| CVE-2022-23222 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/4e695c44106d3f0f9908ffb1c9593205bb7f80ed) |
| CVE-2022-0185 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/76a954013f985828558dc67851b1a455ae7d3421) |
| CVE-2021-22600 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/214329f8032e15f72d39ab3ecf95b5fab274fe1a) |
| CVE-2022-22942 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/9a967f71164cf3b3fc7874b5f1cc193b3819b402) |
| CVE-2022-0492 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/ea8f5c0c115c8c61a76b3dfa51cddb9c5c40fec4) |
| CVE-2022-24448 | Low | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/9e4a6ed92bb4e0b964c5e3fff63d20cf46eda38f)<br/>[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/af9e3d1a2dc61aa346e33a287fb83c8c0d487881)<br/>[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/51fef9de52b5b1431cac919c052f1e82f4cdfbae) |
| CVE-2022-0516 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/8ba71b83e7acfbbf351d3d5b10ced7a4f66c05c9) |
| CVE-2022-0617 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/999c29733c45ac8864c64aa8b4b98df436327096)<br/>[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/7d65b9dbe4277bac42eb649935cd02fdcd47cfe0) |
| CVE-2022-0847 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/b4e786c8ebae053b21583494b44f97e30b58ec3d) |
| CVE-2022-26490 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/141) |
| CVE-2022-25636 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/62e6212596777900936105d7dbc18ed2303026c0) |
| CVE-2022-26966 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/4b80b2d8eba4d9df430b5b19096299b017541e1d) |
| CVE-2022-1011 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/013bad7096d7bee6a3beb0936060e07644fc251d) |
| CVE-2022-27223 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/commit/5939446d63ddecefdbe31834c2ee00c5bc0514e2) |
|OpenHarmony-SA-2022-0601 | NA | The notification subsystem in OpenHarmony has an authentication bypass vulnerability when deserialize an object.| Local attackers can bypass authenication and crash the server process. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|notification_ces_standard| [Link](https://gitee.com/openharmony/notification_common_event_service/pulls/269) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0602 | NA | The notification subsystem in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|notification_ces_standard| [Link](https://gitee.com/openharmony/notification_common_event_service/pulls/245) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0603 | NA | The updateservice in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|update_updateservice| [Link](https://gitee.com/openharmony/update_updateservice/pulls/115) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0604 | NA | The multimedia subsystem in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|multimedia_media_standard| [Link](https://gitee.com/openharmony/multimedia_media_standard/pulls/567) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0601 | NA | The notification subsystem in OpenHarmony has an authentication bypass vulnerability when deserialize an object.| Local attackers can bypass authenication and crash the server process. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/269)<br/>[3.1.x](https://gitee.com/openharmony/notification_common_event_service/pulls/288) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0602 | NA | The notification subsystem in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/245) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0603 | NA | The updateservice in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|update_updateservice| [3.0.x](https://gitee.com/openharmony/update_updateservice/pulls/115) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0604 | NA | The multimedia subsystem in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|multimedia_media_standard| [3.0.x](https://gitee.com/openharmony/multimedia_media_standard/pulls/567) |Reported by OpenHarmony Team|
### The following table lists the third-party library vulnerabilities with only the CVE, severity, and affected OpenHarmony versions provided. For more details, see the security bulletins released by third-parties.
| CVE-2022-25313 | Medium | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25314 | High | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25315 | Medium | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25235 | High | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25236 | Critical | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-23308 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS|[Link](https://gitee.com/openharmony/third_party_libxml2/pulls/11) |
| CVE-2022-25375 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-25258 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-0435 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-24959 | Low | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2021-44879 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-24958 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2021-45402 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2021-4160 | Medium | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_openssl/pulls/29) |
| CVE-2022-0778 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/third_party_openssl/pulls/34) |
| CVE-2022-0886 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/143) |
| CVE-2022-1055 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)|
| CVE-2022-0995 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)|
| CVE-2021-39698 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)|
| CVE-2022-0494 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)|
| CVE-2022-1048 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)|
| CVE-2022-1016 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)|
| CVE-2021-39686 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)|
| CVE-2022-0500 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/163) |
| CVE-2022-28390 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)|
| CVE-2022-28389 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)|
| CVE-2022-28388 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)|
| CVE-2022-28893 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)|
| CVE-2022-1353 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)|
| CVE-2022-29156 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)|
| CVE-2022-28356 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)|
| CVE-2019-16089 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/152) |
| CVE-2021-4156 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/third_party_libsnd/pulls/10)|
| CVE-2022-22576 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/third_party_curl/pulls/52)|
| CVE-2022-27775 | Low | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/third_party_curl/pulls/52)|
| CVE-2022-27776 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/third_party_curl/pulls/52)|
| CVE-2022-27774 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS and OpenHarmony-v3.1-Release|[Link](https://gitee.com/openharmony/third_party_curl/pulls/52)|
| CVE-2021-3520 | Critical | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS|[Link](https://gitee.com/openharmony/third_party_lz4/pulls/2) |
| CVE-2021-44732 | Critical | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_mbedtls/pulls/31) |
| CVE-2021-36690 | High | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS|[Link](https://gitee.com/openharmony/third_party_sqlite/pulls/4) |
| CVE-2021-3732 | Low | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|[Link](https://gitee.com/openharmony/kernel_linux_5.10/pulls/180) |
| CVE-2021-22570 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS|[Link](https://gitee.com/openharmony/third_party_protobuf/pulls/26) |
| CVE-2021-22569 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS|[Link](https://gitee.com/openharmony/third_party_protobuf/pulls/27) |
| CVE-2022-25313 | Medium | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25314 | High | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25315 | Medium | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25235 | High | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-25236 | Critical | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_expat/pulls/10) |
| CVE-2022-23308 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS |[3.0.x](https://gitee.com/openharmony/third_party_libxml2/pulls/11) |
| CVE-2022-25375 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-25258 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-0435 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-24959 | Low | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2021-44879 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2022-24958 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2021-45402 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/146) |
| CVE-2021-4160 | Medium | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_openssl/pulls/29) |
| CVE-2022-0778 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/third_party_openssl/pulls/34) |
| CVE-2022-0886 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/143) |
| CVE-2022-1055 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-0995 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2021-39698 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-0494 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-1048 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-1016 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2021-39686 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/175)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-0500 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/163) |
| CVE-2022-28390 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-28389 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-28388 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-28893 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-1353 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-29156 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)<br/>[3.1.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/214)|
| CVE-2022-28356 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/181)<br/>3.1.x not fixed|
| CVE-2019-16089 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/152) |
| CVE-2021-4156 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/third_party_libsnd/pulls/10)<br/>[3.1.x](https://gitee.com/openharmony/third_party_libsnd/pulls/11)|
| CVE-2022-22576 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/third_party_curl/pulls/52)<br/>[3.1.x](https://gitee.com/openharmony/third_party_curl/pulls/51)|
| CVE-2022-27775 | Low | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/third_party_curl/pulls/52)<br/>[3.1.x](https://gitee.com/openharmony/third_party_curl/pulls/51)|
| CVE-2022-27776 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/third_party_curl/pulls/52)<br/>[3.1.x](https://gitee.com/openharmony/third_party_curl/pulls/51)|
| CVE-2022-27774 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS<br/>OpenHarmony-v3.1-Release |[3.0.x](https://gitee.com/openharmony/third_party_curl/pulls/52)<br/>[3.1.x](https://gitee.com/openharmony/third_party_curl/pulls/51)|
| CVE-2021-3520 | Critical | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS |[3.0.x](https://gitee.com/openharmony/third_party_lz4/pulls/2) |
| CVE-2021-44732 | Critical | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_mbedtls/pulls/31) |
| CVE-2021-36690 | High | OpenHarmony-v3.0-LTS and OpenHarmony-v3.0.1-LTS |[3.0.x](https://gitee.com/openharmony/third_party_sqlite/pulls/4) |
| CVE-2021-3732 | Low | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS |[3.0.x](https://gitee.com/openharmony/kernel_linux_5.10/pulls/180) |
| CVE-2021-22570 | High | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS |[3.0.x](https://gitee.com/openharmony/third_party_protobuf/pulls/26) |
| CVE-2021-22569 | Medium | OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.2-LTS |[3.0.x](https://gitee.com/openharmony/third_party_protobuf/pulls/27) |