First published: Mon Dec 02 2019(Updated: )
Use of local variable as argument to netlink CB callback goes out of it scope when callback triggered lead to invalid stack memory in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCA8081, QCS405, QCS605, QM215, SA6155P, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Qualcomm APQ8009 Firmware | ||
Qualcomm APQ8009 | ||
Qualcomm apq8017 firmware | ||
Qualcomm APQ8017 | ||
qualcomm apq8053-ac firmware | ||
Qualcomm APQ8053 Firmware | ||
Qualcomm APQ8096AU Firmware | ||
Qualcomm APQ8096AU Firmware | ||
qualcomm APQ8098 | ||
Qualcomm 8098 | ||
Qualcomm IPQ4019 | ||
Qualcomm IPQ4019 Firmware | ||
Qualcomm IPQ8064 Firmware | ||
Qualcomm IPQ8064 Firmware | ||
Qualcomm IPQ8074 Firmware | ||
Qualcomm IPQ8074A | ||
Qualcomm MDM9150 firmware | ||
Qualcomm MDM9150 firmware | ||
Qualcomm MDM9206 | ||
Qualcomm MDM9206 firmware | ||
qualcomm MDM9207C firmware | ||
Qualcomm 9207 LTE Modem | ||
Qualcomm MD9607 Firmware | ||
Qualcomm MDM9607 firmware | ||
Qualcomm MDM9650 | ||
Qualcomm MDM9650 firmware | ||
Qualcomm MSM8909W | ||
Qualcomm MSM8909W | ||
Qualcomm MSM8909W | ||
Qualcomm Snapdragon 8909 | ||
Qualcomm MSM8917 Firmware | ||
Qualcomm MSM8917 Firmware | ||
Qualcomm 8920 Firmware | ||
qualcomm MSM8920 firmware | ||
Qualcomm MSM8937 | ||
qualcomm MSM8937 firmware | ||
Qualcomm MSM8939 | ||
Qualcomm MSM8939 | ||
qualcomm MSM8940 firmware | ||
Qualcomm MSM8940 | ||
Qualcomm MSM8953 Firmware | ||
Qualcomm MSM8953 | ||
qualcomm MSM8996AU firmware | ||
Qualcomm MSM8996AU Firmware | ||
Qualcomm MSM8998 | ||
Qualcomm 8998 | ||
Qualcomm Nicobar Firmware | ||
Qualcomm Nicobar | ||
qualcomm qca6574au firmware | ||
Qualcomm QCA6574AU | ||
Qualcomm QCA8081 firmware | ||
Qualcomm QCA8081 | ||
Qualcomm QCS405 Firmware | ||
Qualcomm QCS405 Firmware | ||
Qualcomm ZZ QCS605 firmware | ||
Qualcomm QCS605 Firmware | ||
Qualcomm 215 Firmware | ||
Qualcomm 215 | ||
Qualcomm SA6155 | ||
Qualcomm SA6155P | ||
Qualcomm SDA845 Firmware | ||
Qualcomm SDA845 | ||
Qualcomm SDM429W | ||
Qualcomm SDM429 | ||
qualcomm SDM439 firmware | ||
Qualcomm SDM439 | ||
Qualcomm SDM450 Firmware | ||
Qualcomm Snapdragon 450 | ||
qualcomm SDM630 firmware | ||
qualcomm SDM630 | ||
Qualcomm SDM632 | ||
Qualcomm SDM632 | ||
Qualcomm SDM636 Firmware | ||
Qualcomm SDM636 | ||
Qualcomm SDM660 Firmware | ||
Qualcomm Snapdragon 660 | ||
Qualcomm SDM670 Firmware | ||
Qualcomm SDM670 | ||
Qualcomm SD710 Firmware | ||
Qualcomm SDM710 | ||
Qualcomm SDA/SDM845 Firmware | ||
Qualcomm Snapdragon 845 | ||
Qualcomm SDX20 Firmware | ||
Qualcomm SDX20 Firmware | ||
Qualcomm SDX24 Firmware | ||
Qualcomm SDX24 | ||
Qualcomm SDX55M Firmware | ||
Qualcomm SDX55 | ||
qualcomm SM6150P firmware | ||
Qualcomm SM6150P | ||
qualcomm SM7150 firmware | ||
qualcomm SM7150 firmware | ||
Qualcomm SM8150 Firmware | ||
qualcomm SM8150P | ||
Qualcomm SM8250 | ||
Qualcomm qsm8250 | ||
Qualcomm SXR1130 | ||
Qualcomm SXR1130 Firmware | ||
qualcomm SXR2130P firmware | ||
Qualcomm SXR2130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10600 has been classified as critical due to its potential to corrupt memory and lead to arbitrary code execution.
To fix CVE-2019-10600, update your device firmware to the latest version provided by Qualcomm or your device manufacturer.
CVE-2019-10600 affects a variety of Qualcomm Snapdragon platforms, including smartphones and IoT devices.
CVE-2019-10600 could potentially allow attackers to execute arbitrary code with elevated privileges due to memory corruption.
Currently, the best practice is to apply the official patch, as there are no known workarounds that effectively mitigate CVE-2019-10600.