Search
Total
55 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2023-28566 | 1 Qualcomm | 250 Aqt1000, Aqt1000 Firmware, Csrb31024 and 247 more | 2023-11-14 | N/A | 5.5 MEDIUM |
| Information disclosure in WLAN HAL while handling the WMI state info command. | |||||
| CVE-2023-28568 | 1 Qualcomm | 176 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 173 more | 2023-11-14 | N/A | 5.5 MEDIUM |
| Information disclosure in WLAN HAL when reception status handler is called. | |||||
| CVE-2023-28576 | 1 Qualcomm | 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more | 2023-08-15 | N/A | 7.0 HIGH |
| The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues. | |||||
| CVE-2023-28575 | 1 Qualcomm | 120 205, 205 Firmware, 215 and 117 more | 2023-08-15 | N/A | 7.8 HIGH |
| The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it. | |||||
| CVE-2023-28577 | 1 Qualcomm | 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more | 2023-08-15 | N/A | 7.8 HIGH |
| In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address. | |||||
