#VU63091 Buffer overflow in Qualcomm products - CVE-2022-22072
Published: May 12, 2022 / Updated: May 12, 2022
APQ8009
APQ8017
APQ8053
APQ8096AU
MDM9150
MDM9206
MDM9607
MDM9650
MSM8937
QCA6174A
QCA6574AU
QCA9377
QCA9379
QCS405
QCS605
SD670
SD710
SD835
SD845
SDX20
SDX24
AR8031
CSRA6620
CSRA6640
MDM9250
MDM9626
MDM9628
PM8937
QCA4020
QCA6175A
QCA6310
QCA6320
QCA6335
QCA6564A
QCA6564AU
QCA6574
QCA6574A
QCA9367
QCS603
SA515M
SD820
SDX12
SDXR1
WCD9326
WCD9330
WCD9335
WCD9340
WCD9341
WCN3610
WCN3615
WCN3660B
WCN3680B
WCN3980
WCN3990
WCN3998
WCN3999
WSA8810
WSA8815
Qualcomm
Description
The vulnerability allows a local application to compromise vulnerable system.
The vulnerability exists due to a buffer overflow in the WLAN Host Communication component caused by an improper validation of NDP application information length. A local application can trigger a buffer overflow and execute arbitrary code with elevated privileges.
Remediation
External links
- https://docs.qualcomm.com/bundle/publicresource/HD-10000-1/topics/may-2022-bulletin.html
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=34fa11aeb2d9232d4ed4b4babab0e4760f04aa92
- https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=18eae871c458008b7b7fcb729a3c9a73e4fdc135
- https://source.codeaurora.org/quic/le/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=36dd3a5a3c4278272cbe2c78392499bee51671c4