The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Project Subscriptions

Vendors Products
Qualcomm Subscribe
Fastconnect 6800 Subscribe
Fastconnect 6800 Firmware Subscribe
Fastconnect 6900 Subscribe
Fastconnect 6900 Firmware Subscribe
Fastconnect 7800 Subscribe
Fastconnect 7800 Firmware Subscribe
Qca6391 Subscribe
Qca6391 Firmware Subscribe
Qca6426 Subscribe
Qca6426 Firmware Subscribe
Qca6436 Subscribe
Qca6436 Firmware Subscribe
Qcn9074 Subscribe
Qcn9074 Firmware Subscribe
Qcs410 Firmware Subscribe
Qcs610 Firmware Subscribe
Sd865 5g Subscribe
Sd865 5g Firmware Subscribe
Snapdragon 865\+ 5g Subscribe
Snapdragon 865\+ 5g Firmware Subscribe
Snapdragon 865 5g Subscribe
Snapdragon 865 5g Firmware Subscribe
Snapdragon 870 5g Subscribe
Snapdragon 870 5g Firmware Subscribe
Snapdragon 8 Gen 1 Subscribe
Snapdragon 8 Gen 1 Firmware Subscribe
Snapdragon X55 5g Subscribe
Snapdragon X55 5g Firmware Subscribe
Snapdragon Xr2 5g Subscribe
Snapdragon Xr2 5g Firmware Subscribe
Sw5100 Firmware Subscribe
Sw5100p Subscribe
Sw5100p Firmware Subscribe
Sxr2130 Subscribe
Sxr2130 Firmware Subscribe
Wcd9341 Subscribe
Wcd9341 Firmware Subscribe
Wcd9370 Subscribe
Wcd9370 Firmware Subscribe
Wcd9380 Subscribe
Wcd9380 Firmware Subscribe
Wcn3660b Subscribe
Wcn3660b Firmware Subscribe
Wcn3680b Subscribe
Wcn3680b Firmware Subscribe
Wcn3950 Subscribe
Wcn3950 Firmware Subscribe
Wcn3980 Subscribe
Wcn3980 Firmware Subscribe
Wcn3988 Subscribe
Wcn3988 Firmware Subscribe
Wsa8810 Subscribe
Wsa8810 Firmware Subscribe
Wsa8815 Subscribe
Wsa8815 Firmware Subscribe
Wsa8830 Subscribe
Wsa8830 Firmware Subscribe
Wsa8835 Subscribe
Wsa8835 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32246 The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: qualcomm

Published:

Updated: 2024-08-02T13:43:22.705Z

Reserved: 2023-03-17T11:41:45.850Z

Link: CVE-2023-28576

cve-icon Vulnrichment

Updated: 2024-07-08T17:05:06.582Z

cve-icon NVD

Status : Modified

Published: 2023-08-08T10:15:14.640

Modified: 2024-11-21T07:55:34.137

Link: CVE-2023-28576

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses