Page 22 of 119 results (0.008 seconds)

CVSS: 7.0EPSS: 0%CPEs: 62EXPL: 0

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues. El buffer obtenido de APIs del kernel como cam_mem_get_cpu_buf() puede ser legible/escribible en espacio de usuario después de que el kernel acceda a él. En otras palabras, el modo de usuario puede competir y modificar la cabecera del paquete (por ejemplo, header.count), haciendo que las comprobaciones (por ejemplo, las comprobaciones de tamaño) en el código del núcleo no sean válidas. • https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 120EXPL: 0

The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it. La función cam_get_device_priv no comprueba el tipo de manejador devuelto (device/session/link). Esto llevaría a un uso de tipo inválido si se le pasa un manejador incorrecto. • https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin • CWE-823: Use of Out-of-range Pointer Offset CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.8EPSS: 0%CPEs: 376EXPL: 0

Memory Corruption in WLAN HOST while fetching TX status information. • https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 398EXPL: 0

Memory Corruption in Data Modem while processing DMA buffer release event about CFR data. • https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 326EXPL: 0

Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. • https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •