Vulnerabilities in Qualcomm's Adreno GPU Chipsets Affect Billions of Android Devices
Vulnerabilities in Qualcomm’s Adreno GPU Chipsets Occupy an impact on Billions of Android Devices
Google researchers have identified severe security vulnerabilities within Qualcomm’s Adreno GPU, potentially affecting billions of Android devices globally. If exploited, these vulnerabilities may perchance maybe lead to unauthorized win admission to and preserve watch over over affected devices, posing a extensive possibility to customers’ knowledge and privacy.
Qualcomm, a number one producer of mobile processors and wi-fi chipsets, has confirmed the existence of those vulnerabilities in its most up-to-date security bulletin.
The firm has been working closely with Android tool producers to form and deploy significant patches to mitigate the dangers linked with these flaws.
Fundamental features of the Qualcomm’s Adreno GPU Vulnerabilities
Safety researchers identified vulnerabilities essentially linked with Qualcomm’s proprietary tool aged within the Adreno GPU. These problems were classified as high-impact, with quite a lot of receiving a severe security rating.
The vulnerabilities span quite a lot of technology areas, alongside side the Multi-Mode Call Processor, Hypervisor, and HLOS (Excessive-Stage Working System).
The vulnerabilities impact many in type Android smartphones and tablets, including devices from Samsung, Google, Xiaomi, OnePlus, and a lot of other manufacturers that utilize Qualcomm’s Adreno GPU in their chipsets.
Qualcomm has published a list of affected chipsets in its security bulletin, urging tool producers to integrate the offered patches into their firmware updates promptly.
The vulnerabilities stem from sinful memory management within the Adreno GPU driver, which may perchance maybe lead to memory corruption, knowledge leakage, and arbitrary code execution. By crafting malicious apps or exploiting compromised websites, attackers may perchance maybe potentially construct elevated privileges on the affected devices.
Excessive Severity Key Vulnerabilities
- CVE-2024-23350: A severe vulnerability within the Multi-Mode Call Processor that can perchance maybe lead to a Denial of Service (DoS) assault. This pains arises when the DL NAS transport receives quite a lot of payloads, one of which comprises a Safety of Radio (SOR) container with a failed integrity take a look at.
- CVE-2024-21481: A high-severity vulnerability within the Hypervisor that outcomes in memory corruption within the middle of shared memory notification preparation. This flaw may perchance maybe allow attackers to provide arbitrary code on the affected tool.
- CVE-2024-23352: One more severe pains within the Multi-Mode Call Processor, where an infinite loop situation will be triggered, main to a transient DoS.
- CVE-2024-23353: This vulnerability involves a buffer over-learn within the Multi-Mode Call Processor, potentially causing a transient DoS while decoding obvious community messages.
Apart from to the Adreno GPU vulnerabilities, researchers have also uncovered a buffer over-learn flaw in Qualcomm’s audio processing component.
This vulnerability, CVE-2024-21479, can lead to a transient denial-of-service (DOS) situation within the middle of the playback of ALAC audio relate material. Whereas no longer as severe because the GPU flaws, this vulnerability mute risks the stability and reliability of affected devices.
In accordance with the Qualcomm file, this list high-impact security vulnerabilities. Patches are being actively shared with OEMs, who were notified and strongly instructed to deploy those patches on released devices as quickly as that it is probably going you’ll perchance maybe perchance imagine. Please contact the tool producer for knowledge on the patching living of released devices.
Affect and Response
The vulnerabilities impact many Qualcomm chipsets, alongside side in type ones maintain the Snapdragon 8 Gen 3 Cell Platform and varied 5G Modem-RF Systems.
Given the intensive use of Qualcomm chipsets in Android devices, the likely impact is mammoth, affecting billions of customers worldwide.
Qualcomm has acknowledged these vulnerabilities and is actively working with Authentic Instruments Producers (OEMs) to distribute patches. Users are strongly knowledgeable to interchange their devices when patches develop into readily within the market to mitigate ability risks.
Qualcomm has expressed gratitude to the researchers who reported these problems and is coordinating with exchange partners to win sure that timely updates.
The firm also collaborates with the Google Android Safety team to contend with these vulnerabilities comprehensively.
The invention of those vulnerabilities underscores the importance of sturdy security measures in tool type and the need for continuous vigilance within the tech exchange.
Users are encouraged to cease instructed about security updates and defend their devices in opposition to threats.
Source credit : cybersecuritynews.com


.webp?w=1068&resize=1068,0&ssl=1)




