← Retour aux CVEs
CVE-2022-22057
HIGH8.4
Description
Use after free in graphics fence due to a race condition while closing fence file descriptor and destroy graphics timeline simultaneously in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
Details CVE
Score CVSS v3.18.4
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie6/14/2022
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
qualcomm:apq8053qualcomm:apq8053_firmwarequalcomm:ar8035qualcomm:ar8035_firmwarequalcomm:msm8953qualcomm:msm8953_firmwarequalcomm:qca6174aqualcomm:qca6174a_firmwarequalcomm:qca6390qualcomm:qca6390_firmwarequalcomm:qca6391qualcomm:qca6391_firmwarequalcomm:qca6426qualcomm:qca6426_firmwarequalcomm:qca6436qualcomm:qca6436_firmwarequalcomm:qca6595auqualcomm:qca6595au_firmwarequalcomm:qca8081qualcomm:qca8081_firmwarequalcomm:qca8337qualcomm:qca8337_firmwarequalcomm:qca9377qualcomm:qca9377_firmwarequalcomm:qcm2290qualcomm:qcm2290_firmwarequalcomm:qcm4290qualcomm:qcm4290_firmwarequalcomm:qcm6490qualcomm:qcm6490_firmwarequalcomm:qcs2290qualcomm:qcs2290_firmwarequalcomm:qcs4290qualcomm:qcs4290_firmwarequalcomm:qcs6490qualcomm:qcs6490_firmwarequalcomm:qrb5165qualcomm:qrb5165_firmwarequalcomm:qrb5165mqualcomm:qrb5165m_firmwarequalcomm:qrb5165nqualcomm:qrb5165n_firmwarequalcomm:qualcomm215qualcomm:qualcomm215_firmwarequalcomm:sa6155pqualcomm:sa6155p_firmwarequalcomm:sa8155pqualcomm:sa8155p_firmwarequalcomm:sa8195pqualcomm:sa8195p_firmwarequalcomm:sd439qualcomm:sd439_firmwarequalcomm:sd460qualcomm:sd460_firmwarequalcomm:sd480qualcomm:sd480_firmwarequalcomm:sd662qualcomm:sd662_firmwarequalcomm:sd680qualcomm:sd680_firmwarequalcomm:sd690_5gqualcomm:sd690_5g_firmwarequalcomm:sd695qualcomm:sd695_firmwarequalcomm:sd750gqualcomm:sd750g_firmwarequalcomm:sd765qualcomm:sd765_firmwarequalcomm:sd765gqualcomm:sd765g_firmwarequalcomm:sd768gqualcomm:sd768g_firmwarequalcomm:sd778gqualcomm:sd778g_firmwarequalcomm:sd780gqualcomm:sd780g_firmwarequalcomm:sd865_5gqualcomm:sd865_5g_firmwarequalcomm:sd870qualcomm:sd870_firmwarequalcomm:sd888qualcomm:sd888_5gqualcomm:sd888_5g_firmwarequalcomm:sd888_firmwarequalcomm:sd_8_gen1_5g_firmwarequalcomm:sdx12qualcomm:sdx12_firmwarequalcomm:sdx55mqualcomm:sdx55m_firmwarequalcomm:sdx65qualcomm:sdx65_firmwarequalcomm:sdxr2_5gqualcomm:sdxr2_5g_firmwarequalcomm:sm7250pqualcomm:sm7250p_firmwarequalcomm:sm7315qualcomm:sm7315_firmwarequalcomm:sm7325pqualcomm:sm7325p_firmwarequalcomm:sm8475qualcomm:sw5100qualcomm:sw5100_firmwarequalcomm:sw5100pqualcomm:sw5100p_firmwarequalcomm:wcd9326qualcomm:wcd9326_firmwarequalcomm:wcd9335qualcomm:wcd9335_firmwarequalcomm:wcd9341qualcomm:wcd9341_firmwarequalcomm:wcd9370qualcomm:wcd9370_firmwarequalcomm:wcd9375qualcomm:wcd9375_firmwarequalcomm:wcd9380qualcomm:wcd9380_firmwarequalcomm:wcd9385qualcomm:wcd9385_firmwarequalcomm:wcn3615qualcomm:wcn3615_firmwarequalcomm:wcn3660bqualcomm:wcn3660b_firmwarequalcomm:wcn3680bqualcomm:wcn3680b_firmwarequalcomm:wcn3910qualcomm:wcn3910_firmwarequalcomm:wcn3950qualcomm:wcn3950_firmwarequalcomm:wcn3980qualcomm:wcn3980_firmwarequalcomm:wcn3988qualcomm:wcn3988_firmwarequalcomm:wcn3991qualcomm:wcn3991_firmwarequalcomm:wcn3998qualcomm:wcn3998_firmwarequalcomm:wcn6740qualcomm:wcn6740_firmwarequalcomm:wcn6750qualcomm:wcn6750_firmwarequalcomm:wcn6850qualcomm:wcn6850_firmwarequalcomm:wcn6851qualcomm:wcn6851_firmwarequalcomm:wcn6855qualcomm:wcn6855_firmwarequalcomm:wcn6856qualcomm:wcn6856_firmwarequalcomm:wcn7850qualcomm:wcn7850_firmwarequalcomm:wcn7851qualcomm:wcn7851_firmwarequalcomm:wsa8810qualcomm:wsa8810_firmwarequalcomm:wsa8815qualcomm:wsa8815_firmwarequalcomm:wsa8830qualcomm:wsa8830_firmwarequalcomm:wsa8835qualcomm:wsa8835_firmware
Faiblesses (CWE)
CWE-362
References
http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html(product-security@qualcomm.com)
https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin(product-security@qualcomm.com)
http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.