漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MDM9625, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 600, SD 615/16/SD 415, SD 617, SD 650/52, SD 800, SD 808, and SD 810, in widevine_dash_cmd_handler(), rsp buffers are passed off to widevine commands. These rsp buffers have values in them, such as buffer lengths, that need to be validated to ensure that no buffer overflow/over-reads happen. However, rsp buffers are not always in locked memory, meaning a time-of-check, time-of-use issue can occur where we check that the value is valid, but then a race condition occurs where this memory is swapped out with a different, possibly out of range, value.
漏洞信息
N/A
漏洞
N/A
漏洞
Android Qualcomm闭源组件竞争条件漏洞
漏洞信息
Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。Qualcomm IPQ4019等都是美国高通(Qualcomm)公司应用于不同平台的中央处理器(CPU)产品。 Android 2018-04-05之前版本中的Qualcomm闭源组件存在竞争条件漏洞。远程攻击者可利用该漏洞获取访问权限。以下产品(用于移动设备和手表)受到影响:Qualcomm IPQ4019;MDM9206;MDM9607;MDM9625;MDM9635M;MSM
漏洞信息
N/A
漏洞
N/A