7.8
CWE
416
Advisory Published
CVE Published
Updated

CVE-2019-2329: Use After Free

First published: Mon Oct 07 2019(Updated: )

Use after free issue in cleanup routine due to missing pointer sanitization for a failed start of a trusted application. in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, QCS404, QCS605, SDA845, SDM670, SDM710, SDM845, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm 9205 Firmware
Qualcomm 9205
Qualcomm QCS404 Firmware
Qualcomm QCS404 Firmware
Qualcomm ZZ QCS605 firmware
Qualcomm QCS605 Firmware
Qualcomm SD845 Firmware
Qualcomm Snapdragon 845
Qualcomm SD 670 Firmware
Qualcomm SDM670 Firmware
Qualcomm SD710 Firmware
Qualcomm Snapdragon 710
Qualcomm SDA/SDM845 Firmware
Qualcomm Snapdragon 845
Qualcomm SDX55M Firmware
Qualcomm SDX55 Firmware
qualcomm SM6150P firmware
Qualcomm SM6150P
qualcomm SM7150 firmware
qualcomm SM7150 firmware
Qualcomm SM8150P Firmware
Qualcomm SM8150 Fusion
Qualcomm SXR1130
Qualcomm SXR1130 Firmware
qualcomm SXR2130P firmware
Qualcomm SXR2130

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-2329?

    CVE-2019-2329 is considered a high-severity vulnerability due to the potential for exploitation through use after free issues.

  • How do I fix CVE-2019-2329?

    To fix CVE-2019-2329, ensure that you have installed the latest firmware updates provided by Qualcomm or your device manufacturer.

  • Which devices are affected by CVE-2019-2329?

    CVE-2019-2329 affects various Snapdragon products including MDM9205, QCS404, QCS605, SDA845, and several firmware versions.

  • What is a use after free vulnerability as illustrated in CVE-2019-2329?

    A use after free vulnerability occurs when a program continues to access memory after it has been freed, potentially allowing an attacker to execute arbitrary code.

  • Is CVE-2019-2329 an ongoing risk for users of affected devices?

    Yes, CVE-2019-2329 poses an ongoing risk until the affected devices are updated with the appropriate security patches.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203