First published: Thu Jul 30 2020(Updated: )
Use-after-free issue could occur due to dangling pointer when generating a frame buffer in OpenGL ES in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, Nicobar, QCM2150, QCS405, Saipan, SDM845, SM8150, SM8250, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | ||
Qualcomm Apq8009 | ||
Google Android | ||
Qualcomm Nicobar | ||
Qualcomm Qcm2150 Firmware | ||
Google Android | ||
Qualcomm Qcs405 Firmware | ||
Qualcomm Qcs405 | ||
Google Android | ||
Google Android | ||
Qualcomm Sdm845 Firmware | ||
Qualcomm Sdm845 | ||
Qualcomm Sm8150 Firmware | ||
Qualcomm Sm8150 | ||
Qualcomm Sm8250 Firmware | ||
Qualcomm SM8250 | ||
Qualcomm Sxr2130 Firmware | ||
Qualcomm Sxr2130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3671 is a use-after-free vulnerability that could occur due to a dangling pointer when generating a frame buffer in OpenGL ES.
CVE-2020-3671 affects Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, Nicobar, QCM2150, QCS405, Saipan, SDM845, SM8150, SM8250, SXR2130.
The severity of CVE-2020-3671 is critical with a severity score of 9.8.
To fix CVE-2020-3671, it is recommended to apply the necessary security patches provided by Qualcomm and Google.
You can find more information about CVE-2020-3671 on the Qualcomm Product Security Bulletins page and the Android Security Bulletin for September 2020.