In Android prior to 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 615/16/SD 415, SD 617, SD 650/52, SD 800, SD 808, SD 820, and SD 820A, function ce_pkcs1_pss_padding_verify_auto_recover_saltlen assumes that the size of the encoded message is equal to the size of the RSA modulus. This assumption is true for most RSA keys, but it fails when modulus_bitlen % 8 == 1.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
qualcomm sd_210_firmware - |
||
qualcomm sd_212_firmware - |
||
qualcomm sd_205_firmware - |
||
qualcomm sd_400_firmware - |
||
qualcomm sd_410_firmware - |
||
qualcomm sd_412_firmware - |
||
qualcomm sd_615_firmware - |
||
qualcomm sd_616_firmware - |
||
qualcomm sd_415_firmware - |
||
qualcomm sd_617_firmware - |
||
qualcomm sd_650_firmware - |
||
qualcomm sd_652_firmware - |
||
qualcomm sd_800_firmware - |
||
qualcomm sd_808_firmware - |
||
qualcomm sd_820a_firmware - |
||
qualcomm sd_820_firmware - |