Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same.
References
Link | Resource |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
16 Oct 2024, 20:27
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Qualcomm wsa8835 Firmware
Qualcomm wsa8835 Qualcomm wsa8830 Qualcomm qca6698aq Qualcomm snapdragon Auto 5g Modem-rf Gen 2 Firmware Qualcomm qca6584au Firmware Qualcomm qca6698aq Firmware Qualcomm wcn3988 Firmware Qualcomm sw5100 Qualcomm sw5100p Firmware Qualcomm Qualcomm wcn3988 Qualcomm qca9367 Qualcomm wcn3980 Qualcomm qca9377 Qualcomm wsa8830 Firmware Qualcomm qca9367 Firmware Qualcomm wcn3980 Firmware Qualcomm qca9377 Firmware Qualcomm qca6584au Qualcomm sw5100 Firmware Qualcomm snapdragon Auto 5g Modem-rf Gen 2 Qualcomm sw5100p |
|
CPE | cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:* |
|
References | () https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html - Vendor Advisory |
07 Oct 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-07 13:15
Updated : 2024-10-16 20:27
NVD link : CVE-2024-23370
Mitre link : CVE-2024-23370
CVE.ORG link : CVE-2024-23370
JSON object : View
Products Affected
qualcomm
- wcn3980
- sw5100
- wcn3988
- wsa8830_firmware
- snapdragon_auto_5g_modem-rf_gen_2
- wsa8835_firmware
- qca9377
- wsa8835
- sw5100_firmware
- wcn3988_firmware
- snapdragon_auto_5g_modem-rf_gen_2_firmware
- qca6584au
- qca9367
- sw5100p_firmware
- wsa8830
- qca9367_firmware
- qca9377_firmware
- qca6584au_firmware
- sw5100p
- qca6698aq_firmware
- qca6698aq
- wcn3980_firmware
CWE
CWE-416
Use After Free