Memory corruption can occur during context user dumps due to inadequate checks on buffer length.
References
Link | Resource |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
09 May 2025, 19:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Qualcomm wcn3620
Qualcomm Qualcomm fastconnect 6900 Qualcomm wcd9380 Firmware Qualcomm wcn3620 Firmware Qualcomm wsa8835 Qualcomm sdm429w Qualcomm snapdragon 429 Mobile Qualcomm wsa8830 Firmware Qualcomm snapdragon 429 Mobile Firmware Qualcomm fastconnect 7800 Firmware Qualcomm wcn3660b Firmware Qualcomm wsa8835 Firmware Qualcomm fastconnect 7800 Qualcomm sdm429w Firmware Qualcomm wcd9380 Qualcomm wsa8830 Qualcomm wcn3660b Qualcomm fastconnect 6900 Firmware Qualcomm snapdragon 8 Gen 1 Mobile Firmware Qualcomm snapdragon 8 Gen 1 Mobile |
|
CPE | cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:* |
|
References | () https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html - Patch, Vendor Advisory |
07 May 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 May 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-06 09:15
Updated : 2025-05-09 19:12
NVD link : CVE-2024-49829
Mitre link : CVE-2024-49829
CVE.ORG link : CVE-2024-49829
JSON object : View
Products Affected
qualcomm
- wcn3660b
- wcd9380
- snapdragon_429_mobile_firmware
- wcd9380_firmware
- fastconnect_7800_firmware
- wcn3660b_firmware
- snapdragon_8_gen_1_mobile
- wcn3620
- wsa8835_firmware
- snapdragon_8_gen_1_mobile_firmware
- sdm429w_firmware
- wsa8835
- wcn3620_firmware
- sdm429w
- snapdragon_429_mobile
- fastconnect_6900_firmware
- fastconnect_7800
- wsa8830
- fastconnect_6900
- wsa8830_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')