First published: Mon Apr 02 2018(Updated: )
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9625, MDM9635M, SD 400, and SD 800, while computing the length of memory allocated for a Diag event, if the buffer length is very small or greater than the maximum, an integer overflow may occur, which later results in a buffer overflow.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm Mdm9625 Firmware | ||
Google Android | ||
Google Android | ||
Qualcomm Mdm9635m | ||
Qualcomm Sd 400 Firmware | ||
Qualcomm Sd 400 | ||
Qualcomm Sd 800 Firmware | ||
Qualcomm Sd 800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-9150 is critical, with a severity value of 9.8.
Qualcomm Snapdragon Mobile devices MDM9625, MDM9635M, SD 400, and SD 800 are affected by CVE-2015-9150.
If the buffer length in CVE-2015-9150 is very small or greater than the maximum, an integer overflow may occur.
To fix CVE-2015-9150, update your Android device to the latest security patch level provided by Google or Qualcomm.
You can find more information about CVE-2015-9150 at the following references: [link1], [link2], [link3].