First published: Thu Jul 30 2020(Updated: )
Use-after-free issue could occur due to dangling pointer when generating a frame buffer in OpenGL ES in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, Nicobar, QCM2150, QCS405, Saipan, SDM845, SM8150, SM8250, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm apq8009 firmware | ||
Qualcomm apq8009 | ||
qualcomm Nicobar firmware | ||
qualcomm Nicobar | ||
qualcomm QCM2150 firmware | ||
qualcomm QCM2150 | ||
Qualcomm QCS405 Firmware | ||
Qualcomm QCS405 Firmware | ||
qualcomm Saipan firmware | ||
qualcomm Saipan | ||
qualcomm SDM845 firmware | ||
qualcomm SDM845 | ||
qualcomm SM8150 firmware | ||
qualcomm SM8150 | ||
qualcomm SM8250 firmware | ||
Qualcomm SM8250 | ||
qualcomm SXR2130 firmware | ||
qualcomm SXR2130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3671 is a use-after-free vulnerability that could occur due to a dangling pointer when generating a frame buffer in OpenGL ES.
CVE-2020-3671 affects Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, Nicobar, QCM2150, QCS405, Saipan, SDM845, SM8150, SM8250, SXR2130.
The severity of CVE-2020-3671 is critical with a severity score of 9.8.
To fix CVE-2020-3671, it is recommended to apply the necessary security patches provided by Qualcomm and Google.
You can find more information about CVE-2020-3671 on the Qualcomm Product Security Bulletins page and the Android Security Bulletin for September 2020.