Vulnerabilities (CVE)

Filtered by vendor Qualcomm Subscribe
Filtered by product Fastconnect 6900 Firmware
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-28566 1 Qualcomm 250 Aqt1000, Aqt1000 Firmware, Csrb31024 and 247 more 2023-11-14 N/A 5.5 MEDIUM
Information disclosure in WLAN HAL while handling the WMI state info command.
CVE-2023-28568 1 Qualcomm 176 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 173 more 2023-11-14 N/A 5.5 MEDIUM
Information disclosure in WLAN HAL when reception status handler is called.
CVE-2023-28576 1 Qualcomm 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more 2023-08-15 N/A 7.0 HIGH
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.
CVE-2023-28575 1 Qualcomm 120 205, 205 Firmware, 215 and 117 more 2023-08-15 N/A 7.8 HIGH
The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it.
CVE-2023-28577 1 Qualcomm 62 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 59 more 2023-08-15 N/A 7.8 HIGH
In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.