We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21426

Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Camera_Linux



Description

Memory corruption while processing camera TPG write request.

Reserved 2024-12-18 | Published 2025-07-08 | Updated 2025-07-08 | Assigner qualcomm


MEDIUM: 6.6CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L

Problem types

CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unaffected

FastConnect 7800
affected

Snapdragon AR1 Gen 1 Platform
affected

Snapdragon AR1 Gen 1 Platform "Luna1"
affected

SSG2115P
affected

SSG2125P
affected

SXR1230P
affected

WCD9380
affected

WCD9385
affected

WSA8830
affected

WSA8832
affected

WSA8835
affected

References

docs.qualcomm.com/...ecuritybulletin/july-2025-bulletin.html

cve.org (CVE-2025-21426)

nvd.nist.gov (CVE-2025-21426)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21426

Support options

Helpdesk Chat, Email, Knowledgebase