Memory corruption can occur during context user dumps due to inadequate checks on buffer length.
References
Link | Resource |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
09 May 2025, 19:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Qualcomm fastconnect 7800 Firmware
Qualcomm wsa8830 Firmware Qualcomm Qualcomm wsa8830 Qualcomm sdm429w Qualcomm snapdragon 8 Gen 1 Mobile Qualcomm snapdragon 8 Gen 1 Mobile Firmware Qualcomm wsa8835 Qualcomm snapdragon 429 Mobile Qualcomm fastconnect 7800 Qualcomm wcn3660b Qualcomm wcn3660b Firmware Qualcomm wcn3620 Firmware Qualcomm wcn3620 Qualcomm fastconnect 6900 Firmware Qualcomm snapdragon 429 Mobile Firmware Qualcomm wcd9380 Qualcomm wsa8835 Firmware Qualcomm fastconnect 6900 Qualcomm wcd9380 Firmware Qualcomm sdm429w Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:* |
|
References | () https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html - Patch, Vendor Advisory |
06 May 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-06 09:15
Updated : 2025-05-09 19:12
NVD link : CVE-2024-49829
Mitre link : CVE-2024-49829
JSON object : View
Products Affected
qualcomm
- snapdragon_429_mobile_firmware
- wcd9380_firmware
- fastconnect_7800_firmware
- fastconnect_6900_firmware
- wcn3620_firmware
- wcn3620
- wcn3660b
- snapdragon_429_mobile
- wsa8835
- fastconnect_6900
- wsa8830_firmware
- wcn3660b_firmware
- sdm429w
- snapdragon_8_gen_1_mobile
- wsa8830
- fastconnect_7800
- snapdragon_8_gen_1_mobile_firmware
- sdm429w_firmware
- wsa8835_firmware
- wcd9380
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')