Memory corruption can occur during context user dumps due to inadequate checks on buffer length.
References
Link | Resource |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
09 May 2025, 19:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html - Patch, Vendor Advisory | |
First Time |
Qualcomm fastconnect 7800 Firmware
Qualcomm sdm429w Qualcomm wsa8835 Firmware Qualcomm snapdragon 8 Gen 1 Mobile Firmware Qualcomm fastconnect 7800 Qualcomm snapdragon 8 Gen 1 Mobile Qualcomm fastconnect 6900 Firmware Qualcomm wcn3620 Qualcomm Qualcomm snapdragon 429 Mobile Firmware Qualcomm sdm429w Firmware Qualcomm wcd9380 Qualcomm wcn3660b Firmware Qualcomm wsa8835 Qualcomm wcn3660b Qualcomm wcn3620 Firmware Qualcomm wcd9380 Firmware Qualcomm fastconnect 6900 Qualcomm wsa8830 Firmware Qualcomm snapdragon 429 Mobile Qualcomm wsa8830 |
|
CPE | cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:* |
07 May 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 May 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-06 09:15
Updated : 2025-05-09 19:12
NVD link : CVE-2024-49829
Mitre link : CVE-2024-49829
CVE.ORG link : CVE-2024-49829
JSON object : View
Products Affected
qualcomm
- fastconnect_7800
- snapdragon_429_mobile
- fastconnect_7800_firmware
- wsa8835
- snapdragon_8_gen_1_mobile
- wcn3660b
- wsa8835_firmware
- wcn3660b_firmware
- sdm429w
- fastconnect_6900_firmware
- wcn3620
- wcn3620_firmware
- wcd9380_firmware
- wsa8830
- wcd9380
- wsa8830_firmware
- sdm429w_firmware
- fastconnect_6900
- snapdragon_429_mobile_firmware
- snapdragon_8_gen_1_mobile_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')