Huawei has kick off the latest September 2020 security update rollout for Huawei P30 smartphones. This update mainly installs the latest Android security patches released in September 2020 to improve system security.
- September 2020 Windows 10 update Two or three weeks ago I got a notification that Windows 10 needed to restart to load updates, and I was asked if I wanted to 'restart now' or 'schedule a restart'. I scheduled a restart for the early morning hours when I wouldn't be working.
- A fat Windows Update for September's Patch Tuesday Microsoft released 129 updates to its Windows ecosystem this month. The good news: we are not dealing with any zero-days or publicly reported.
Meanwhile, Huawei is testing EMUI 11 on its Huawei P40 and Mate 30 series devices. On the other hand, Huawei P30 and Mate 20 series users may have to wait a bit longer to get their share of EMUI 11 beta.
Moreover, Huawei has not officially confirmed EMUI 11 eligibility for these two smartphones but we can assume that the Huawei P30 and Mate 20 models, atleast, eligible to get the latest changes offered with EMUI 11 compared to other old Huawei devices.
September 11, 2020 baalajimaestro Leave a comment This might be the final update containing feature improvements for Android Q. We’ll not be freezing Q, we will continue supporting it for another 3 months.
Huawei P30 series Update Changelog:
Security: Integrates Android security patches released in September 2020 for improved system security.
September 2020 Security Patch Details:
September 2020 security update install security fixes for different levels of exploits and issues within Huawei phones including 3 critical and 19 high levels of CVEs.
UPDATED SOFTWARE VERSION:
This latest update for Huawei P30 devices comes with EMUI 10.1 version 10.1.0.166 and has a package size of 154MB. The update is confirmed in Indian model.
Note:
- EMUI version and size may vary depending on the country/region.
- The update is rolling out in batches so it may take some time/days to reach your device.
Want to send us Tips, Update Screenshots, or a Message? connect with us here:
- [email protected]
- [email protected]
- Message us on Twitter
HOW TO UPDATE Huawei P30/P30 Pro:
Via Settings:
- Settings
- System & updates
- Software update
- CHECK FOR UPDATES
- Download and install
Via Support:
- Support app
- Services Tab
- Update
- CHECK FOR UPDATES
- Download and install
Thanks to the tipster – Adam
Recommended for you
Google is committed to advancing racial equity for Black communities. See how.
Published September 08, 2020
The Pixel Update Bulletin contains details of security vulnerabilities and functional improvements affecting supported Pixel devices (Google devices). For Google devices, security patch levels of 2020-09-05 or later address all issues in this bulletin and all issues in the September 2020 Android Security Bulletin. To learn how to check a device's security patch level, see Check and update your Android version.
All supported Google devices will receive an update to the 2020-09-05 patch level. We encourage all customers to accept these updates to their devices.
Note:Coronavirus Update September
The Google device firmware images are available on the Google Developer site.Announcements
- In addition to the security vulnerabilities described in the September 2020 Android Security Bulletin, Google devices also contain patches for the security vulnerabilities described below.
Security patches
Vulnerabilities are grouped under the component that they affect. There is a description of the issue and a table with the CVE, associated references, type of vulnerability, severity, and updated Android Open Source Project (AOSP) versions (where applicable). When available, we link the public change that addressed the issue to the bug ID, like the AOSP change list. When multiple changes relate to a single bug, additional references are linked to numbers following the bug ID.
Kernel components
CVE | References | Type | Severity | Subcomponent |
---|---|---|---|---|
CVE-2020-0387 | A-156046804* | EoP | High | SmartSpace |
CVE-2020-0403 | A-131252923* | EoP | High | Fingerprint |
CVE-2020-0434 | A-150730508* | EoP | High | Catpipe |
CVE-2019-14895 | A-146643236 | RCE | Moderate | Marvell WiFi chip driver |
CVE-2019-14896 | A-145850595 | RCE | Moderate | Marvell network driver |
CVE-2019-14901 | A-146642940 | RCE | Moderate | Marvell WiFi chip driver |
CVE-2018-14615 | A-133762747 | EoP | Moderate | Kernel |
CVE-2020-0428 | A-123999783* | EoP | Moderate | Camera |
CVE-2020-0429 | A-152735806 v4.9 - [1] [2] v4.4 - [1] [2] [3] [4] [5] [6] [7] [8] | EoP | Moderate | pppol2tp |
CVE-2020-0430 | A-153881554 | EoP | Moderate | BPF |
CVE-2020-0431 | A-144161459 | EoP | Moderate | Keyboard |
CVE-2020-0432 | A-143560807 | EoP | Moderate | MostCore driver |
CVE-2020-0433 | A-151939299 v4.14 - [1] [2] [3] v4.9 - [1] [2] [3] v.4.4 - [1] [2] [3] [4] | EoP | Moderate | Block multiqueue |
CVE-2020-7053 | A-148267212 | EoP | Moderate | Kernel |
CVE-2020-8649 | A-149079016 | EoP | Moderate | vgacon |
CVE-2020-11609 | A-153715399 | EoP | Moderate | stv06xx |
CVE-2020-12114 | A-156071483 | EoP | Moderate | Linux Filesystem |
CVE-2020-12826 | A-156725178 v4.14 - [1] | EoP | Moderate | Kernel |
CVE-2019-5489 | A-122461273 [2] | ID | Moderate | Kernel |
CVE-2020-0427 | A-140550171 | ID | Moderate | Pin controller |
Qualcomm components
CVE | References | Type | Severity | Component |
---|---|---|---|---|
CVE-2019-2290 | A-119634340* QC-CR#2048964* | N/A | Moderate | Camera |
CVE-2019-10519 | A-134439993 QC-CR#2409133 | N/A | Moderate | Display/graphics |
CVE-2019-10521 | A-126900236 QC-CR#2419292 | N/A | Moderate | Kernel |
CVE-2019-10564 | A-140423451 QC-CR#2362037 | N/A | Moderate | Camera |
CVE-2019-14099 | A-147101313 QC-CR#2360223 [2] [3] [2] [3] | N/A | Moderate | Camera |
CVE-2019-2284 | A-134437692 QC-CR#2395036 | N/A | Moderate | Camera |
CVE-2020-3674 | A-150688918 QC-CR#2562382 | N/A | Moderate | Kernel |
Qualcomm closed-sourcecomponents
CVE | References | Type | Severity | Component |
---|---|---|---|---|
CVE-2019-10498 | A-132108953* | N/A | Moderate | Closed-source component |
CVE-2019-10518 | A-120445948* | N/A | Moderate | Closed-source component |
CVE-2020-3679 | A-150687568* | N/A | Moderate | Closed-source component |
Functional patches
For details on the new bug fixes and functional patches included in thisrelease, refer to the Pixel Communityforum.
Common questions and answers
This section answers common questions that may occur after reading thisbulletin.
1. How do I determine if my device is updated to address these issues?
Security patch levels of 2020-09-05 or later address all issues associatedwith the 2020-09-05 security patch level and all previous patch levels.To learn how to check a device's security patch level, read the instructionson the Google device update schedule.
2. What do the entries in the Type column mean?
September Update On Mehek
Entries in the Type column of the vulnerability details table reference the classification of the security vulnerability.
Abbreviation | Definition |
---|---|
RCE | Remote code execution |
EoP | Elevation of privilege |
ID | Information disclosure |
DoS | Denial of service |
N/A | Classification not available |
3. What do the entries in the References column mean?
Entries under the References column of the vulnerability details table may contain a prefix identifying the organization to which the reference value belongs.
Prefix | Reference |
---|---|
A- | Android bug ID |
QC- | Qualcomm reference number |
M- | MediaTek reference number |
N- | NVIDIA reference number |
B- | Broadcom reference number |
4. What does an * next to the Android bug ID in the Referencescolumn mean?
Issues that are not publicly available have an * next to the Android bug ID in the References column. The update for that issue is generally contained in the latest binary drivers for Pixel devices available from the Google Developer site.
5. Why are security vulnerabilities split between this bulletin and theAndroid Security Bulletins?
Security vulnerabilities that are documented in the Android Security Bulletins are required to declare the latest security patch level on Android devices. Additional security vulnerabilities, such as those documented in this bulletin are not required for declaring a security patch level.
Animal Crossing September Update
Versions
Version | Date | Notes |
---|---|---|
1.0 | September 08, 2020 | Bulletin published |