漏洞信息详情
多款产品输入验证错误漏洞
漏洞简介
Qualcomm 芯片是美国高通(Qualcomm)公司的芯片。一种将电路(主要包括半导体设备,也包括被动组件等)小型化的方式,并时常制造在半导体晶圆表面上。
Qualcomm 多款产品存在输入验证错误漏洞,该漏洞源于在adsp驱动中使用数组索引之前,对通道id检查不当。以下产品及版本受到影响:Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6390, QCA9531, QCM2150, QCS404, QCS405, QCS605, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://source.android.com/security/bulletin/2020-10-01
参考网址
来源:CONFIRM
链接:https://www.qualcomm.com/company/product-security/bulletins/october-2020-bulletin
来源:MISC
链接:https://www.qualcomm.com/company/product-security/bulletins/october-2020-security-bulletin
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3453/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-11174
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Google-Android-multiple-vulnerabilities-of-October-2020-33491
受影响实体
暂无
补丁
- Google Android 安全漏洞的修复措施<!--2020-10-6-->
还没有评论,来说两句吧...