Vulnerability Details : CVE-2023-33106
Memory corruption while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.
Vulnerability category: Memory Corruption
Products affected by CVE-2023-33106
- cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_w5\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_xr2\+_gen_1_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_7c\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_480\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_865\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_888\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_778g\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_8\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_8\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:snapdragon_439_mobile_platform_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*
CVE-2023-33106 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability
CISA required action:
Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
CISA description:
Multiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.
Notes:
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-4.19/-/commit/1e46e81dbeb69a
Added on
2023-12-05
Action due date
2023-12-26
Exploit prediction scoring system (EPSS) score for CVE-2023-33106
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 26 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33106
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
8.4
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.5
|
5.9
|
Qualcomm, Inc. |
CWE ids for CVE-2023-33106
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
-
The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.Assigned by: product-security@qualcomm.com (Secondary)
References for CVE-2023-33106
-
https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin
Security Bulletins | Qualcomm DocumentationPatch;Vendor Advisory
Jump to