{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-28576","assignerOrgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","state":"PUBLISHED","assignerShortName":"qualcomm","dateReserved":"2023-03-17T11:41:45.850Z","datePublished":"2023-08-08T09:15:05.943Z","dateUpdated":"2024-08-02T13:43:22.705Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Snapdragon Compute","Snapdragon Consumer IOT","Snapdragon Industrial IOT","Snapdragon Mobile","Snapdragon Wearables"],"product":"Snapdragon","vendor":"Qualcomm, Inc.","versions":[{"status":"affected","version":"FastConnect 6800"},{"status":"affected","version":"FastConnect 6900"},{"status":"affected","version":"FastConnect 7800"},{"status":"affected","version":"QCA6391"},{"status":"affected","version":"QCA6426"},{"status":"affected","version":"QCA6436"},{"status":"affected","version":"QCN9074"},{"status":"affected","version":"QCS410"},{"status":"affected","version":"QCS610"},{"status":"affected","version":"SD865 5G"},{"status":"affected","version":"Snapdragon 8 Gen 1 Mobile Platform"},{"status":"affected","version":"Snapdragon 865 5G Mobile Platform"},{"status":"affected","version":"Snapdragon 865+ 5G Mobile Platform (SM8250-AB)"},{"status":"affected","version":"Snapdragon 870 5G Mobile Platform (SM8250-AC)"},{"status":"affected","version":"Snapdragon X55 5G Modem-RF System"},{"status":"affected","version":"Snapdragon XR2 5G Platform"},{"status":"affected","version":"SW5100"},{"status":"affected","version":"SW5100P"},{"status":"affected","version":"SXR2130"},{"status":"affected","version":"WCD9341"},{"status":"affected","version":"WCD9370"},{"status":"affected","version":"WCD9380"},{"status":"affected","version":"WCN3660B"},{"status":"affected","version":"WCN3680B"},{"status":"affected","version":"WCN3950"},{"status":"affected","version":"WCN3980"},{"status":"affected","version":"WCN3988"},{"status":"affected","version":"WSA8810"},{"status":"affected","version":"WSA8815"},{"status":"affected","version":"WSA8830"},{"status":"affected","version":"WSA8835"}]}],"descriptions":[{"lang":"en","value":"The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.4,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f","shortName":"qualcomm","dateUpdated":"2024-04-12T16:24:16.350Z"},"references":[{"url":"https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin"}],"title":"Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver","problemTypes":[{"descriptions":[{"cweId":"CWE-367","description":"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition","lang":"en","type":"CWE"}]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-08T17:04:56.771674Z","id":"CVE-2023-28576","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-08T17:05:12.003Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T13:43:22.705Z"},"title":"CVE Program Container","references":[{"url":"https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin","tags":["x_transferred"]}]}]}}