CWE
367
Advisory Published
Updated

CVE-2023-28576: Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Kernel Driver

First published: Tue Aug 08 2023(Updated: )

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

Credit: product-security@qualcomm.com product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Qualcomm Fastconnect 6800 Firmware
Qualcomm Fastconnect 6800
Qualcomm Fastconnect 6900 Firmware
Qualcomm Fastconnect 6900
Qualcomm Fastconnect 7800 Firmware
Qualcomm Fastconnect 7800
Google Android
Google Android
Qualcomm Qca6426 Firmware
Google Android
Google Android
Qualcomm Qca6436
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Qualcomm Snapdragon 8 Gen 1 Firmware
Qualcomm Snapdragon 8 Gen 1
Qualcomm Snapdragon 865 5g Firmware
Qualcomm Snapdragon 865 5g
Qualcomm Snapdragon 865\+ 5g Firmware
Qualcomm Snapdragon 865\+ 5g
Qualcomm Snapdragon 870 5g Firmware
Qualcomm Snapdragon 870 5g
Qualcomm Snapdragon X55 5g Firmware
Qualcomm Snapdragon X55 5g
Qualcomm Snapdragon Xr2 5g Firmware
Qualcomm Snapdragon Xr2 5g
Google Android
Google Android
Google Android
Google Android
Qualcomm Sxr2130 Firmware
Qualcomm Sxr2130
Qualcomm Wcd9341 Firmware
Google Android
Qualcomm Wcd9370 Firmware
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
Google Android
All of
Qualcomm Fastconnect 6800 Firmware
Qualcomm Fastconnect 6800
All of
Qualcomm Fastconnect 6900 Firmware
Qualcomm Fastconnect 6900
All of
Qualcomm Fastconnect 7800 Firmware
Qualcomm Fastconnect 7800
All of
Google Android
Google Android
All of
Qualcomm Qca6426 Firmware
Google Android
All of
Google Android
Qualcomm Qca6436
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Qualcomm Snapdragon 8 Gen 1 Firmware
Qualcomm Snapdragon 8 Gen 1
All of
Qualcomm Snapdragon 865 5g Firmware
Qualcomm Snapdragon 865 5g
All of
Qualcomm Snapdragon 865\+ 5g Firmware
Qualcomm Snapdragon 865\+ 5g
All of
Qualcomm Snapdragon 870 5g Firmware
Qualcomm Snapdragon 870 5g
All of
Qualcomm Snapdragon X55 5g Firmware
Qualcomm Snapdragon X55 5g
All of
Qualcomm Snapdragon Xr2 5g Firmware
Qualcomm Snapdragon Xr2 5g
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Qualcomm Sxr2130 Firmware
Qualcomm Sxr2130
All of
Qualcomm Wcd9341 Firmware
Google Android
All of
Qualcomm Wcd9370 Firmware
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android
All of
Google Android
Google Android

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-28576?

    CVE-2023-28576 is a vulnerability that allows user mode to race and modify the packet header in kernel code, leading to invalid checks.

  • Which software is affected by CVE-2023-28576?

    Qualcomm Fastconnect 6800 Firmware, Qualcomm Fastconnect 6900 Firmware, Qualcomm Fastconnect 7800 Firmware, Qualcomm Qca6426 Firmware, Qualcomm Qca6436 Firmware, Qualcomm Qcn9074 Firmware, Qualcomm Qcs410 Firmware, Qualcomm Qcs610 Firmware, Qualcomm Snapdragon 8 Gen 1 Firmware, Qualcomm Snapdragon 865 5g Firmware, Qualcomm Snapdragon 865+ 5g Firmware, Qualcomm Snapdragon 870 5g Firmware, Qualcomm Snapdragon X55 5g Firmware, Qualcomm Snapdragon Xr2 5g Firmware, Qualcomm Sxr2130 Firmware, Qualcomm Wcd9341 Firmware, Qualcomm Wcd9370 Firmware, Qualcomm Wcd9380 Firmware, Qualcomm Wcn3660b Firmware, Qualcomm Wcn3680b Firmware, Qualcomm Wcn3950 Firmware, Qualcomm Wcn3980 Firmware, Qualcomm Wcn3988 Firmware, Qualcomm Wsa8810 Firmware, Qualcomm Wsa8815 Firmware, Qualcomm Wsa8830 Firmware, Qualcomm Wsa8835 Firmware are affected by CVE-2023-28576.

  • What is the severity of CVE-2023-28576?

    CVE-2023-28576 has a severity score of 7, which is considered high.

  • How does CVE-2023-28576 affect user mode and kernel code?

    CVE-2023-28576 allows user mode to race and modify the packet header in kernel code, leading to invalid checks.

  • Is there a fix available for CVE-2023-28576?

    Please refer to the official advisory from Qualcomm for information on available fixes for CVE-2023-28576.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203