First published: Tue Sep 08 2020(Updated: )
u'During the error occurrence in capture request, the buffer is freed and later accessed causing the camera APP to fail due to memory use-after-free' in Snapdragon Consumer IOT, Snapdragon Mobile in Bitra, Kamorta, QCS605, Saipan, SDM710, SM8250, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm Bitra Firmware | ||
Qualcomm Bitra | ||
Qualcomm Kamorta Firmware | ||
Qualcomm Kamorta | ||
Qualcomm Qcs605 Firmware | ||
Qualcomm Qcs605 | ||
Qualcomm Saipan Firmware | ||
Qualcomm Saipan | ||
Qualcomm Sdm710 Firmware | ||
Qualcomm Sdm710 | ||
Qualcomm Sm8250 Firmware | ||
Qualcomm SM8250 | ||
Qualcomm Sxr2130 Firmware | ||
Qualcomm Sxr2130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-11129.
The severity of CVE-2020-11129 is high with a severity value of 7.8.
CVE-2020-11129 affects Snapdragon Consumer IOT, Snapdragon Mobile in Bitra, Kamorta, QCS605, Saipan, SDM710, SM8250, and SXR2130.
CVE-2020-11129 is a vulnerability in Snapdragon Consumer IOT, Snapdragon Mobile in Bitra, Kamorta, QCS605, Saipan, SDM710, SM8250, and SXR2130 which occurs in the capture request and causes the camera APP to fail due to memory use-after-free.
To fix CVE-2020-11129, it is recommended to apply the necessary security patches provided by Qualcomm and Google.