cve/2021/CVE-2021-1968.md

32 lines
1.8 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-1968](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1968)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Exposure%20in%20Neural%20Processing&color=brighgreen)
### Description
Improper validation of kernel buffer address while copying information back to user buffer can lead to kernel memory information exposure to user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
### POC
#### Reference
- http://packetstormsecurity.com/files/172856/Qualcomm-NPU-Use-After-Free-Information-Leak.html
- https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
2024-08-11 18:44:53 +00:00
- https://github.com/ndk06/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
2024-06-22 09:37:59 +00:00
- https://github.com/wkhnh06/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/xairy/linux-kernel-exploitation