8.4
CWE
416
Advisory Published
CVE Published
Updated

CVE-2018-5891: Use After Free

First published: Mon Jun 04 2018(Updated: )

While processing modem SSR after IMS is registered, the IMS data daemon is restarted but the ipc_dataHandle is no longer available. Consequently, the DPL thread frees the internal memory for dataDHandle but the local variable pointer is not updated which can lead to a Use After Free condition in Snapdragon Mobile and Snapdragon Wear.

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm 8909 Firmware
Qualcomm Snapdragon 8909
qualcomm MSM8996AU firmware
Qualcomm MSM8996AU Firmware
Qualcomm SD210 Firmware
Qualcomm SD 210 Firmware
Qualcomm SD 212
Qualcomm SD 212 Firmware
Qualcomm 205 Firmware
Qualcomm SD205 Firmware
Qualcomm SDM450 Firmware
Qualcomm SDM450
Qualcomm SD615 Firmware
Qualcomm Snapdragon 615
Qualcomm SD 616 Firmware
Qualcomm Snapdragon 616
Qualcomm Snapdragon 415 Firmware
Qualcomm Snapdragon 415
Qualcomm SD 625 Firmware
Qualcomm Snapdragon 625
Qualcomm SD650 Firmware
Qualcomm Snapdragon 650
Qualcomm SD652 Firmware
Qualcomm SD652 Firmware
Qualcomm SD820 Firmware
Qualcomm SD820 Firmware
Qualcomm SD835 Firmware
Qualcomm Snapdragon 835
Qualcomm SDA845 Firmware
Qualcomm SD845

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-5891?

    CVE-2018-5891 has a high severity rating due to the potential for exploitation via a Use After Free condition.

  • How do I fix CVE-2018-5891?

    To address CVE-2018-5891, ensure that your affected Android device is updated to the latest firmware version provided by the manufacturer.

  • Which systems are affected by CVE-2018-5891?

    CVE-2018-5891 affects various Qualcomm modem firmware versions used in multiple Android devices.

  • Can CVE-2018-5891 be exploited remotely?

    Yes, CVE-2018-5891 can potentially be exploited remotely through the processing of IMS data in affected devices.

  • What are the repercussions of not patching CVE-2018-5891?

    Failing to patch CVE-2018-5891 may lead to system instability, crashes, or unauthorized access to sensitive information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203