We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.
Reserved 2023-03-17 | Published 2023-08-08 | Updated 2024-08-02 | Assigner qualcommCWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
www.qualcomm.com/...-security/bulletins/august-2023-bulletin
Support options