ID CVE-2019-10629
Summary u'User Process can potentially corrupt kernel virtual page by passing a crafted page in API' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Bitra, IPQ6018, IPQ8074, MDM9205, Nicobar, QCA8081, QCN7605, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
References
Vulnerable Configurations
  • cpe:2.3:o:qualcomm:bitra_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:bitra_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:bitra:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:bitra:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*
  • cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
    cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 11-09-2020 - 13:15)
Impact:
Exploitability:
CWE CWE-129
CAPEC
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
refmap via4
confirm https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
Last major update 11-09-2020 - 13:15
Published 08-09-2020 - 10:15
Last modified 11-09-2020 - 13:15
Back to Top