First published: Thu Jul 30 2020(Updated: )
Use-after-free issue could occur due to dangling pointer when generating a frame buffer in OpenGL ES in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, Nicobar, QCM2150, QCS405, Saipan, SDM845, SM8150, SM8250, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Qualcomm APQ8009W Firmware | ||
Qualcomm APQ8009W | ||
Qualcomm Nicobar | ||
Qualcomm Nicobar | ||
Qualcomm QCM2150 | ||
Qualcomm QCM2150 Firmware | ||
Qualcomm QCS405 Firmware | ||
Qualcomm QCS405 Firmware | ||
Qualcomm Saipan Firmware | ||
Qualcomm Saipan Firmware | ||
Qualcomm SDA/SDM845 Firmware | ||
Qualcomm Snapdragon 845 | ||
Qualcomm SM8150P Firmware | ||
Qualcomm SM8150 Fusion | ||
Qualcomm SM8250 | ||
Qualcomm qsm8250 | ||
qualcomm SXR2130P firmware | ||
Qualcomm SXR2130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3671 is a use-after-free vulnerability that could occur due to a dangling pointer when generating a frame buffer in OpenGL ES.
CVE-2020-3671 affects Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, Nicobar, QCM2150, QCS405, Saipan, SDM845, SM8150, SM8250, SXR2130.
The severity of CVE-2020-3671 is critical with a severity score of 9.8.
To fix CVE-2020-3671, it is recommended to apply the necessary security patches provided by Qualcomm and Google.
You can find more information about CVE-2020-3671 on the Qualcomm Product Security Bulletins page and the Android Security Bulletin for September 2020.