buffer overflow while processing user inputs in Snapdragon Automotive, Snapdragon Connectivity, Snapdragon Secure, Snapdragon XR.

Due to insecure memory management in graphics programs, an attacker can crash the graphics card to cause memory corruption.

Due to insecure memory management in graphics programs, an attacker can crash the graphics card to cause memory corruption. User input validation in graphics programs can also lead to buffer overflow.

Insecurely handled user input in graphics programs can lead to denial-of-service (DoS), remote code execution (RCE), information leak, remote memory access, and session hijacking.

Remote code execution in graphics programs in Snapdragon Mobile, Snapdragon Wearables.

Due to insecure memory management in graphics programs, an attacker can crash the graphics card to cause memory corruption.

Due to insecure memory management in graphics programs, an attacker can crash the graphics card to cause memory corruption. User input validation in graphics programs can also lead to buffer overflow.

Insecurely handled user input in graphics programs can lead to DoS, remote code execution (RCE), information leak, remote memory access, and session hijacking.

Memory corruption in graphics due to buffer overflow while validating the user address in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Secure, Snapdragon XR.

Remote code execution in graphics programs

A buffer overflow can be caused by a graphics program validating user input. An attacker can exploit this to cause memory corruption and remote code execution (RCE). The vulnerable code is located in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Compute, Snapdragon Consumer IOT, and Snapdragon Industrial IOT.

Remote memory access in graphics programs while processing user inputs in Snapdragon Auto.

Buffer overflow in graphics while processing user inputs in Snapdragon Auto.

Security Benefits of Ongoing Software Updates

Updating software is a proven, effective way to protect your smartphone from cyber-security risks. But beware: not all updates are created equal.
As tech companies continue to push out security patches, the list of applications and operating systems with known vulnerabilities is growing at an alarming rate. As a result, users need to be extra vigilant about which software they install on their devices.
You can protect yourself by installing only the software you need for your device and by using the latest apps and operating systems available for your device. All of your installed applications should be up-to-date too because outdated software is vulnerable to security risks.
Finally, consider that not all apps need constant updating. Some may work just fine without it and you’ll be better protected if you don’t constantly update your apps while others are continually updated.

Timeline

Published on: 11/15/2022 10:15:00 UTC
Last modified on: 11/18/2022 04:57:00 UTC

References