First published: Mon Apr 02 2018(Updated: )
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile MDM9625, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, and SD 820A, no address argument validation performed on calls to a QSEE syscall may lead to arbitrary read/write or NULL Pointer exception when calling a downstream function.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm Mdm9625 Firmware | ||
Google Android | ||
Qualcomm Sd 425 Firmware | ||
Qualcomm Sd 425 | ||
Qualcomm Sd 430 Firmware | ||
Qualcomm Sd 430 | ||
Qualcomm Sd 450 Firmware | ||
Qualcomm Sd 450 | ||
Qualcomm Sd 625 Firmware | ||
Qualcomm Sd 625 | ||
Qualcomm Sd 650 Firmware | ||
Qualcomm Sd 650 | ||
Qualcomm Sd 652 Firmware | ||
Qualcomm Sd 652 | ||
Qualcomm Sd 820a Firmware | ||
Qualcomm Sd 820a | ||
Qualcomm Sd 820 Firmware | ||
Qualcomm Sd 820 | ||
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-9108 is classified as a critical vulnerability that can lead to arbitrary read/write operations.
To fix CVE-2015-9108, update your device to the latest firmware version that includes the April 2018 security patch or later.
CVE-2015-9108 affects various Qualcomm Snapdragon chipsets, including MDM9625, SD 425, 430, 450, 625, 650, 652, 820, and 820A models.
The potential impacts of CVE-2015-9108 include unauthorized access, data corruption, or system crashes due to improper input validation.
CVE-2015-9108 was disclosed on April 5, 2018, as part of the Android security bulletin.