First published: Wed Oct 20 2021(Updated: )
Improper handling of sensor HAL structure in absence of sensor can lead to use after free in Snapdragon Auto
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm Mdm9628 | ||
Google Android | ||
Google Android | ||
Qualcomm Qca6564au Firmware | ||
Google Android | ||
Qualcomm Qca6574 Firmware | ||
Qualcomm Qca6574 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Qca6574au | ||
Qualcomm Qca6595 Firmware | ||
Qualcomm Qca6595 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Qca6696 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Sa6155p | ||
Google Android | ||
Qualcomm Sa8150p | ||
Qualcomm Sa8155 Firmware | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Sa8195p Firmware | ||
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30315 is rated as high severity due to improper handling of sensor HAL structure, which can lead to use after free vulnerabilities.
To resolve CVE-2021-30315, apply the latest firmware update provided by Qualcomm for the affected Snapdragon Auto platforms.
CVE-2021-30315 affects various Qualcomm chipsets including Mdm9628, Qca6564au, Qca6595, and others listed in the official advisory.
CVE-2021-30315 could allow attackers to exploit the vulnerability for remote code execution or denial of service in Snapdragon Auto systems.
Currently, the recommended solution for CVE-2021-30315 is to apply firmware updates, as no specific workarounds have been provided.