diff --git a/en/security-disclosure/2022/2022-06.md b/en/security-disclosure/2022/2022-06.md
index 6af628463cc41bef510997912eb6c51fb9de0a2c..1ff72fe33125df0105f5eece1c335fc4ef8f7927 100644
--- a/en/security-disclosure/2022/2022-06.md
+++ b/en/security-disclosure/2022/2022-06.md
@@ -1,10 +1,10 @@
## Security Vulnerabilities in June 2022
_published June 6,2022_
-_updated July 15,2022_
+_updated August 19,2022_
| Vulnerability ID | related Vulnerability | Vulnerability Descripton | Vulnerability Impact | affected versions | affected projects| fix link | reference |
| -------- |-------- | -------- | -------- | ----------- | ----------- | -------- | ------- |
-|OpenHarmony-SA-2022-0601 | NA | The notification subsystem in OpenHarmony has an authentication bypass vulnerability when deserialize an object.| Local attackers can bypass authenication and crash the server process. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/269)
[3.1.x](https://gitee.com/openharmony/notification_common_event_service/pulls/288) |Reported by OpenHarmony Team|
+|OpenHarmony-SA-2022-0601 | NA | The notification subsystem in OpenHarmony has an authentication bypass vulnerability when deserialize an object.| Local attackers can bypass authenication and crash the server process. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/402)
[3.1.x](https://gitee.com/openharmony/notification_common_event_service/pulls/288) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0602 | NA | The notification subsystem in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/245) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0603 | NA | The updateservice in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|update_updateservice| [3.0.x](https://gitee.com/openharmony/update_updateservice/pulls/115) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0604 | NA | The multimedia subsystem in OpenHarmony has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|multimedia_media_standard| [3.0.x](https://gitee.com/openharmony/multimedia_media_standard/pulls/567) |Reported by OpenHarmony Team|
diff --git a/en/security-disclosure/2022/2022-07.md b/en/security-disclosure/2022/2022-07.md
index eaa166edc9bb4637d67c518e91300233c6707e88..a524e7e354cdbca6b40613fe54312aa0748d8b4e 100644
--- a/en/security-disclosure/2022/2022-07.md
+++ b/en/security-disclosure/2022/2022-07.md
@@ -1,11 +1,12 @@
## Security Vulnerabilities in July 2022
_published July 5,2022_
+_updated August 19,2022_
| Vulnerability ID | related Vulnerability | Vulnerability Descripton | Vulnerability Impact | affected versions | affected projects| fix link | reference |
| -------- |-------- | -------- | -------- | ----------- | ----------- | -------- | ------- |
|OpenHarmony-SA-2022-0701 | NA | The bluetooth in communication subsystem has a DoS vulnerability. | Local attackers can trigger a large loop and crash the process. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|communication_bluetooth| [3.0.x](https://gitee.com/openharmony/communication_bluetooth/pulls/179) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0702 | NA | The updater in update subsystem has a null pointer reference vulnerability. | Local attackers can input a nullptr and crash the process. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|update_updater| [3.0.x](https://gitee.com/openharmony/update_updater/pulls/101) |Reported by OpenHarmony Team|
-|OpenHarmony-SA-2022-0703 | NA | The dsoftbus in communication subsystem has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/142) |Reported by OpenHarmony Team|
+|OpenHarmony-SA-2022-0703 | NA | The dsoftbus in communication subsystem has an authentication bypass vulnerability which allows an "SA relay attack". | Local attackers can bypass authentication and get system control. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.5-LTS|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/2140) |Reported by OpenHarmony Team|
### The following table lists the third-party library vulnerabilities with only the CVE, severity, and affected OpenHarmony versions provided. For more details, see the security bulletins released by third-parties.
diff --git a/en/security-disclosure/2022/2022-08.md b/en/security-disclosure/2022/2022-08.md
index 185269f39b5b8210e81a588cd6367ea0f07151bf..ab6e748004a176607aa4b4318dc60b8cb1c22034 100644
--- a/en/security-disclosure/2022/2022-08.md
+++ b/en/security-disclosure/2022/2022-08.md
@@ -1,12 +1,13 @@
## Security Vulnerabilities in August 2022
_published August 2,2022_
+_updated August 19,2022_
-| Vulnerability ID | related Vulnerability | Vulnerability Descripton | Vulnerability Impact | affected versions | affected projects| fix link | reference |
+| Vulnerability ID | related Vulnerability | Vulnerability Description | Vulnerability Impact | affected versions | affected projects| fix link | reference |
| -------- |-------- | -------- | -------- | ----------- | ----------- | -------- | ------- |
-|OpenHarmony-SA-2022-0801 | NA | DecodeUCS2Data in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
-|OpenHarmony-SA-2022-0802 | NA | DecodeGSMData in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
-|OpenHarmony-SA-2022-0803 | NA | DecodeAddress in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
-|OpenHarmony-SA-2022-0804 | NA | Decode8bitData in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
+|OpenHarmony-SA-2022-0801 | NA | DecodeUCS2Data in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
+|OpenHarmony-SA-2022-0802 | NA | DecodeGSMData in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
+|OpenHarmony-SA-2022-0803 | NA | DecodeAddress in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
+|OpenHarmony-SA-2022-0804 | NA | Decode8bitData in telephony_sms_mms component of telephony subsystem, has a DoS vulnerability. | Network attackers can access illegal memory and crash the process.|OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |Reported by OpenHarmony Team|
|OpenHarmony-SA-2022-0806 | NA | SendMessage in dsoftbus in communication subsystem has a permission bypass vulnerability. | Local attackers can bypass the permission check, and write any data into network devices. |OpenHarmony-v3.0-LTS through OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release through OpenHarmony-v3.1.1-Release|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/1668) |Reported by OpenHarmony Team|
### The following table lists the third-party library vulnerabilities with only the CVE, severity, and affected OpenHarmony versions provided. For more details, see the security bulletins released by third-parties.
diff --git a/zh/security-disclosure/2022/2022-06.md b/zh/security-disclosure/2022/2022-06.md
index 1e7ca10a8262e7709eef3d9820c7fd81c1e77f99..7532899e88a70551bd9a0cade6390d1679d83399 100644
--- a/zh/security-disclosure/2022/2022-06.md
+++ b/zh/security-disclosure/2022/2022-06.md
@@ -1,10 +1,10 @@
## 2022年6月安全漏洞
_发布于2022.6.6_
-_最后更新于2022.7.15_
+_最后更新于2022.8.19_
| 漏洞编号 | 相关漏洞 | 漏洞描述 | 漏洞影响 | 受影响的版本 | 受影响的仓库 | 修复链接 | 参考链接 |
| -------- |-------- | -------- | -------- | ----------- | ----------- | -------- | ------- |
-|OpenHarmony-SA-2022-0601 | NA | 事件通知子系统反序列化对象时会绕过认证机制。 | 攻击者可在本地发起攻击,造成权限绕过,导致服务端进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/269)
[3.1.x](https://gitee.com/openharmony/notification_common_event_service/pulls/288) |本项目组上报|
+|OpenHarmony-SA-2022-0601 | NA | 事件通知子系统反序列化对象时会绕过认证机制。 | 攻击者可在本地发起攻击,造成权限绕过,导致服务端进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/402)
[3.1.x](https://gitee.com/openharmony/notification_common_event_service/pulls/288) |本项目组上报|
|OpenHarmony-SA-2022-0602 | NA | 事件通知子系统存在校验绕过漏洞,可发起SA中继攻击。 | 攻击者可在本地发起攻击,造成校验绕过,获得系统控制权。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS|notification_common_event_service| [3.0.x](https://gitee.com/openharmony/notification_common_event_service/pulls/245) |本项目组上报|
|OpenHarmony-SA-2022-0603 | NA | 升级服务组件存在校验绕过漏洞,可发起SA中继攻击。 | 攻击者可在本地发起攻击,造成校验绕过,获得系统控制权。 |OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS|update_updateservice| [3.0.x](https://gitee.com/openharmony/update_updateservice/pulls/115) |本项目组上报|
|OpenHarmony-SA-2022-0604 | NA | 多媒体子系统存在校验绕过漏洞,可发起SA中继攻击。 | 攻击者可在本地发起攻击,造成校验绕过,获取系统控制权。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS|multimedia_media_standard| [3.0.x](https://gitee.com/openharmony/multimedia_media_standard/pulls/567) |本项目组上报|
diff --git a/zh/security-disclosure/2022/2022-07.md b/zh/security-disclosure/2022/2022-07.md
index b16808ab1e4e6d183838a8b01cb43e3f5191e0e6..fea57813771acc90bc0fd7fb9bc72b7816cfe73c 100644
--- a/zh/security-disclosure/2022/2022-07.md
+++ b/zh/security-disclosure/2022/2022-07.md
@@ -1,11 +1,12 @@
## 2022年7月安全漏洞
_发布于2022.7.5_
+_最后更新于2022.8.19_
| 漏洞编号 | 相关漏洞 | 漏洞描述 | 漏洞影响 | 受影响的版本 | 受影响的仓库 | 修复链接 | 参考链接 |
| -------- |-------- | -------- | -------- | ----------- | ----------- | -------- | ------- |
|OpenHarmony-SA-2022-0701 | NA | 通信子系统蓝牙组件存在DoS漏洞,造成进程崩溃。 | 攻击者可在本地发起攻击,进入超大循环,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS|communication_bluetooth| [3.0.x](https://gitee.com/openharmony/communication_bluetooth/pulls/179) |本项目组上报|
|OpenHarmony-SA-2022-0702 | NA | 升级子系统升级包安装组件存在空指针引用,造成进程崩溃。| 攻击者可在本地发起攻击,传入空指针,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS|update_updater| [3.0.x](https://gitee.com/openharmony/update_updater/pulls/101) |本项目组上报|
-|OpenHarmony-SA-2022-0703 | NA | 通信子系统软总线存在校验绕过漏洞,可发起SA中继攻击。| 攻击者可在本地发起攻击,造成权限绕过,可获取系统控制权。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/142) |本项目组上报|
+|OpenHarmony-SA-2022-0703 | NA | 通信子系统软总线存在校验绕过漏洞,可发起SA中继攻击。| 攻击者可在本地发起攻击,造成权限绕过,可获取系统控制权。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.5-LTS|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/2140) |本项目组上报|
### 以下为三方库漏洞,只提供CVE、严重程度、受影响的OpenHarmony版本,详细信息请参考三方公告。
diff --git a/zh/security-disclosure/2022/2022-08.md b/zh/security-disclosure/2022/2022-08.md
index 2e50ff5230a6c5d4e2345b4047df34c9e4068523..48416e6b9fd0949af8c2f754f59abc3ff863128d 100644
--- a/zh/security-disclosure/2022/2022-08.md
+++ b/zh/security-disclosure/2022/2022-08.md
@@ -1,12 +1,13 @@
## 2022年8月安全漏洞
_发布于2022.8.2_
+_最后更新于2022.8.19_
| 漏洞编号 | 相关漏洞 | 漏洞描述 | 漏洞影响 | 受影响的版本 | 受影响的仓库 | 修复链接 | 参考链接 |
| -------- |-------- | -------- | -------- | ----------- | ----------- | -------- | ------- |
-|OpenHarmony-SA-2022-0801 | NA | 电话服务子系统telephony_sms_mms组件DecodeUCS2Data存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
-|OpenHarmony-SA-2022-0802 | NA | 电话服务子系统telephony_sms_mms组件DecodeGSMData存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
-|OpenHarmony-SA-2022-0803 | NA | 电话服务子系统telephony_sms_mms组件DecodeAddress存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
-|OpenHarmony-SA-2022-0804 | NA | 电话服务子系统telephony_sms_mms组件Decode8bitData存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
+|OpenHarmony-SA-2022-0801 | NA | 电话服务子系统telephony_sms_mms组件DecodeUCS2Data存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
+|OpenHarmony-SA-2022-0802 | NA | 电话服务子系统telephony_sms_mms组件DecodeGSMData存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
+|OpenHarmony-SA-2022-0803 | NA | 电话服务子系统telephony_sms_mms组件DecodeAddress存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
+|OpenHarmony-SA-2022-0804 | NA | 电话服务子系统telephony_sms_mms组件Decode8bitData存在DoS漏洞。 | 攻击者可在网络内发起攻击,访问非法内存,导致进程崩溃。|OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.5-LTS
OpenHarmony-v3.1-Release|telephony_sms_mms| [3.0.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/404)
[3.1.x](https://gitee.com/openharmony/telephony_sms_mms/pulls/355) |本项目组上报|
|OpenHarmony-SA-2022-0806 | NA | 通信子系统分布式软总线组件SendMessage接口存在漏洞,导致权限管控被绕过。 | 攻击者可在本地发起攻击,绕过权限管控机制,进一步向局域网内设备写入任意数据。 |OpenHarmony-v3.0-LTS到OpenHarmony-v3.0.3-LTS
OpenHarmony-v3.1-Release到OpenHarmony-v3.1.1-Release|communication_dsoftbus| [3.0.x](https://gitee.com/openharmony/communication_dsoftbus/pulls/1668) |本项目组上报|