Advisory Published
Updated

CVE-2019-10561

First published: Tue Jan 21 2020(Updated: )

Improper initialization of local variables which are parameters to sfs api may cause invalid pointer dereference and leads to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9206, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QM215, SDA660, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Google Android
Qualcomm Apq8009
Google Android
Qualcomm Apq8017
Qualcomm Apq8053 Firmware
Qualcomm Apq8053
Qualcomm Apq8096 Firmware
Google Android
Google Android
Google Android
Google Android
Qualcomm Apq8098
Qualcomm Mdm9206 Firmware
Qualcomm Mdm9206
Google Android
Qualcomm Mdm9607
Qualcomm Msm8905 Firmware
Qualcomm Msm8905
Google Android
Qualcomm Msm8909
Qualcomm Msm8909w Firmware
Qualcomm Msm8909w
Qualcomm Msm8917 Firmware
Qualcomm Msm8917
Qualcomm Msm8920 Firmware
Qualcomm Msm8920
Qualcomm Msm8937 Firmware
Google Android
Qualcomm Msm8940 Firmware
Qualcomm Msm8940
Google Android
Google Android
Qualcomm Msm8996 Firmware
Google Android
Qualcomm Msm8996au Firmware
Qualcomm Msm8996au
Google Android
Qualcomm MSM8998
Qualcomm Qm215 Firmware
Qualcomm Qm215
Google Android
Google Android
Google Android
Google Android
Qualcomm Sdm439 Firmware
Qualcomm Sdm439
Google Android
Qualcomm SDM450
Qualcomm Sdm630 Firmware
Qualcomm Sdm630
Qualcomm Sdm632 Firmware
Qualcomm Sdm632
Google Android
Qualcomm Sdm636
Qualcomm Sdm660 Firmware
Qualcomm Sdm660

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-10561?

    CVE-2019-10561 is a vulnerability that can cause an invalid pointer dereference and lead to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.

  • How severe is the CVE-2019-10561 vulnerability?

    The CVE-2019-10561 vulnerability has a severity rating of 5.5 out of 10 (medium).

  • Which software are affected by CVE-2019-10561?

    CVE-2019-10561 affects Google Android, Qualcomm APQ8009 Firmware, Qualcomm APQ8017 Firmware, Qualcomm APQ8053 Firmware, Qualcomm APQ8096 Firmware, Qualcomm APQ8096au Firmware, Qualcomm APQ8098 Firmware, Qualcomm Mdm9206 Firmware, Qualcomm Mdm9607 Firmware, Qualcomm Msm8905 Firmware, Qualcomm Msm8909 Firmware, Qualcomm Msm8909w Firmware, Qualcomm Msm8917 Firmware, Qualcomm Msm8920 Firmware, Qualcomm Msm8937 Firmware, Qualcomm Msm8940 Firmware, Qualcomm Msm8953 Firmware, Qualcomm Msm8996 Firmware, Qualcomm Msm8996au Firmware, Qualcomm MSM8998 Firmware, Qualcomm Qm215 Firmware, Qualcomm Sda660 Firmware, Qualcomm Sdm429 Firmware, Qualcomm Sdm439 Firmware, Qualcomm Sdm450 Firmware, Qualcomm Sdm630 Firmware, Qualcomm Sdm632 Firmware, Qualcomm Sdm636 Firmware, and Qualcomm Sdm660 Firmware.

  • How can I fix CVE-2019-10561 vulnerability?

    To fix the CVE-2019-10561 vulnerability, it is recommended to apply the patches provided by Qualcomm. Please refer to the official Qualcomm product security bulletin for more information.

  • Where can I find more information about CVE-2019-10561?

    More information about CVE-2019-10561 can be found in the official Qualcomm product security bulletin: https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203