First published: Mon Oct 07 2019(Updated: )
Use after free issue in cleanup routine due to missing pointer sanitization for a failed start of a trusted application. in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, QCS404, QCS605, SDA845, SDM670, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Qualcomm 9205 Firmware | ||
Qualcomm 9205 | ||
Qualcomm QCS404 Firmware | ||
Qualcomm QCS404 Firmware | ||
Qualcomm ZZ QCS605 firmware | ||
Qualcomm QCS605 Firmware | ||
Qualcomm SD845 Firmware | ||
Qualcomm Snapdragon 845 | ||
Qualcomm SD 670 Firmware | ||
Qualcomm SDM670 Firmware | ||
Qualcomm SD710 Firmware | ||
Qualcomm Snapdragon 710 | ||
Qualcomm SDA/SDM845 Firmware | ||
Qualcomm Snapdragon 845 | ||
Qualcomm SDX55M Firmware | ||
Qualcomm SDX55 Firmware | ||
qualcomm SM6150P firmware | ||
Qualcomm SM6150P | ||
qualcomm SM7150 firmware | ||
qualcomm SM7150 firmware | ||
Qualcomm SM8150P Firmware | ||
Qualcomm SM8150 Fusion | ||
Qualcomm SXR1130 | ||
Qualcomm SXR1130 Firmware | ||
qualcomm SXR2130P firmware | ||
Qualcomm SXR2130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2329 is considered a high-severity vulnerability due to the potential for exploitation through use after free issues.
To fix CVE-2019-2329, ensure that you have installed the latest firmware updates provided by Qualcomm or your device manufacturer.
CVE-2019-2329 affects various Snapdragon products including MDM9205, QCS404, QCS605, SDA845, and several firmware versions.
A use after free vulnerability occurs when a program continues to access memory after it has been freed, potentially allowing an attacker to execute arbitrary code.
Yes, CVE-2019-2329 poses an ongoing risk until the affected devices are updated with the appropriate security patches.