Home > Article > Technology peripherals > Qualcomm GPU driver 9 vulnerability exposed! How is your phone?
【ITBEAR】According to news on August 12, at the DEF CON 32 security conference in Las Vegas recently, three Google security researchers revealed a major discovery: they showed that more than 9 files exist in the Qualcomm Adreno GPU driver. loopholes in. The existence of these vulnerabilities has attracted widespread attention in the industry. Qualcomm Adreno GPU driver is an important bridge connecting GPU hardware and operating systems such as Android. It has deep permissions in the system kernel. What's concerning, however, is that apps on Android phones are able to communicate directly with Qualcomm's Adreno GPU driver without going through a sandbox or additional permission checks. According to ITBEAR, the seriousness of this security vulnerability cannot be ignored. An attacker could exploit these vulnerabilities to gain complete control over the memory of an affected device, thereby achieving a takeover of the entire device. This discovery undoubtedly sounds a wake-up call for the security of Android devices. Xuan Xing, Google's Android security red team manager, said: "Compared with the huge Android ecosystem, our team is relatively small. Our work scope is broad and we cannot cover everything, so we must focus on solving the problems that may have the greatest impact. "The reason why we focus on the GPU driver is because untrusted applications don't need any permissions to access the GPU driver. This is critical and I think it will attract a lot of attention." Attackers Attention.”
Faced with this serious security challenge, Qualcomm has taken action. A Qualcomm spokesperson confirmed that they had provided patches for relevant vulnerabilities to OEMs in May 2024, and encouraged end users to obtain and apply these patches from device manufacturers to ensure the security of their devices.The above is the detailed content of Qualcomm GPU driver 9 vulnerability exposed! How is your phone?. For more information, please follow other related articles on the PHP Chinese website!