CVE-2020-3622

u'Channel name string which has been read from shared memory is potentially subjected to string manipulations but not validated for NULL termination can results into memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
Configurations

Configuration 1

cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:bitra:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*

Information

Published : 2020-09-08 10:15

Updated : 2021-07-21 11:39


NVD link : CVE-2020-3622

Mitre link : CVE-2020-3622

Products Affected
CWE