First published: Tue Sep 08 2020(Updated: )
u'Possible out of bound array write in rxdco cal utility due to lack of array bound check' in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MSM8998, QCS605, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SXR1130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm MSM8998 | ||
Qualcomm Qcs605 Firmware | ||
Google Android | ||
Qualcomm Sda845 Firmware | ||
Qualcomm Sda845 | ||
Qualcomm Sdm630 Firmware | ||
Qualcomm Sdm630 | ||
Google Android | ||
Qualcomm Sdm636 | ||
Qualcomm Sdm660 Firmware | ||
Qualcomm Sdm660 | ||
Qualcomm Sdm670 Firmware | ||
Qualcomm Sdm670 | ||
Qualcomm Sdm710 Firmware | ||
Qualcomm Sdm710 | ||
Qualcomm Sdm845 Firmware | ||
Qualcomm Sdm845 | ||
Qualcomm Sdm850 Firmware | ||
Qualcomm Sdm850 | ||
Qualcomm Sxr1130 Firmware | ||
Qualcomm Sxr1130 | ||
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-11133.
The severity of CVE-2020-11133 is high, with a CVSS score of 7.8.
The affected software includes Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, and Snapdragon Mobile in MSM8998, QCS605, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, and SXR1130.
It is recommended to apply the patches provided by Qualcomm and Google Android.
More information about CVE-2020-11133 can be found at the following references: [Link 1](https://source.android.com/docs/security/bulletin/2020-09-01/#asterisk), [Link 2](https://source.android.com/docs/security/bulletin/2020-09-01), [Link 3](https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin).