Vulnerability Description
Use after free condition can occur in wired connectivity due to a race condition while creating and deleting folders in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qualcomm | Apq8096Au Firmware | - |
| Qualcomm | Apq8096Au | - |
| Qualcomm | Ar8031 Firmware | - |
| Qualcomm | Ar8031 | - |
| Qualcomm | Ar8035 Firmware | - |
| Qualcomm | Ar8035 | - |
| Qualcomm | Ar9380 Firmware | - |
| Qualcomm | Ar9380 | - |
| Qualcomm | Csr8811 Firmware | - |
| Qualcomm | Csr8811 | - |
| Qualcomm | Csra6620 Firmware | - |
| Qualcomm | Csra6620 | - |
| Qualcomm | Csra6640 Firmware | - |
| Qualcomm | Csra6640 | - |
| Qualcomm | Ipq4018 Firmware | - |
| Qualcomm | Ipq4018 | - |
| Qualcomm | Ipq4019 Firmware | - |
| Qualcomm | Ipq4019 | - |
| Qualcomm | Ipq4028 Firmware | - |
| Qualcomm | Ipq4028 | - |
Related Weaknesses (CWE)
References
- https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletiPatchVendor Advisory
- https://www.qualcomm.com/company/product-security/bulletins/january-2022-bulletiPatchVendor Advisory
FAQ
What is CVE-2021-30313?
CVE-2021-30313 is a vulnerability with a CVSS score of 6.7 (MEDIUM). Use after free condition can occur in wired connectivity due to a race condition while creating and deleting folders in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consume...
How severe is CVE-2021-30313?
CVE-2021-30313 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-30313?
Check the references section above for vendor advisories and patch information. Affected products include: Qualcomm Apq8096Au Firmware, Qualcomm Apq8096Au, Qualcomm Ar8031 Firmware, Qualcomm Ar8031, Qualcomm Ar8035 Firmware.