7.8
CWE
416
Advisory Published
Updated

CVE-2020-3696: Use After Free

First published: Mon Nov 02 2020(Updated: )

u'Use after free while installing new security rule in ipcrtr as old one is deleted and this rule could still be in use for checking security permission for particular process' in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8996AU, QCA4531, QCA6574AU, QCA9531, QCM2150, QCS605, SDM429W, SDX20, SDX24

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Google Android
Qualcomm Apq8009
Google Android
Qualcomm Apq8017
Qualcomm Apq8053 Firmware
Qualcomm Apq8053
Google Android
Google Android
Google Android
Qualcomm Apq8098
Qualcomm Ipq4019 Firmware
Qualcomm Ipq4019
Google Android
Qualcomm Ipq6018
Qualcomm Ipq8064 Firmware
Qualcomm Ipq8064
Qualcomm Ipq8074 Firmware
Qualcomm Ipq8074
Qualcomm Mdm9206 Firmware
Qualcomm Mdm9206
Google Android
Google Android
Google Android
Qualcomm Mdm9607
Qualcomm Msm8905 Firmware
Qualcomm Msm8905
Qualcomm Msm8909w Firmware
Qualcomm Msm8909w
Qualcomm Msm8996au Firmware
Qualcomm Msm8996au
Qualcomm Qca4531 Firmware
Qualcomm Qca4531
Google Android
Qualcomm Qca6574au
Qualcomm Qca9531 Firmware
Qualcomm Qca9531
Qualcomm Qcm2150 Firmware
Google Android
Qualcomm Qcs605 Firmware
Google Android
Qualcomm Sdm429w Firmware
Qualcomm Sdm429w
Qualcomm Sdx20 Firmware
Qualcomm Sdx20
Qualcomm Sdx24 Firmware
Google Android

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-3696?

    CVE-2020-3696 is a vulnerability that allows for use after free while installing new security rules in ipcrtr even when the old rule is deleted.

  • Which Qualcomm products are affected by CVE-2020-3696?

    Qualcomm Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, and some firmware versions of Google Android and Qualcomm chipsets are affected.

  • What is the severity of CVE-2020-3696?

    The severity of CVE-2020-3696 is high, with a severity value of 7.8.

  • How can I fix CVE-2020-3696?

    To fix CVE-2020-3696, it is recommended to apply the necessary security patches provided by Qualcomm.

  • Where can I find more information about CVE-2020-3696?

    You can find more information about CVE-2020-3696 in the October 2020 security bulletin published by Qualcomm.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203