Memory corruption can occur during context user dumps due to inadequate checks on buffer length.
References
Link | Resource |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
09 May 2025, 19:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html - Patch, Vendor Advisory | |
First Time |
Qualcomm fastconnect 7800 Firmware
Qualcomm sdm429w Firmware Qualcomm snapdragon 8 Gen 1 Mobile Qualcomm wcn3620 Qualcomm wcd9380 Firmware Qualcomm wcn3660b Firmware Qualcomm wsa8830 Firmware Qualcomm wsa8835 Firmware Qualcomm sdm429w Qualcomm snapdragon 429 Mobile Firmware Qualcomm wsa8835 Qualcomm fastconnect 6900 Firmware Qualcomm wcd9380 Qualcomm wcn3620 Firmware Qualcomm Qualcomm wsa8830 Qualcomm snapdragon 429 Mobile Qualcomm snapdragon 8 Gen 1 Mobile Firmware Qualcomm wcn3660b Qualcomm fastconnect 6900 Qualcomm fastconnect 7800 |
|
CPE | cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_429_mobile:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:snapdragon_429_mobile_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* |
07 May 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 May 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-06 09:15
Updated : 2025-05-09 19:12
NVD link : CVE-2024-49829
Mitre link : CVE-2024-49829
CVE.ORG link : CVE-2024-49829
JSON object : View
Products Affected
qualcomm
- snapdragon_8_gen_1_mobile_firmware
- wcd9380_firmware
- sdm429w_firmware
- wsa8830
- wcn3660b_firmware
- fastconnect_7800
- snapdragon_8_gen_1_mobile
- wcn3620
- wsa8835
- sdm429w
- fastconnect_6900
- wsa8835_firmware
- fastconnect_6900_firmware
- wcn3660b
- snapdragon_429_mobile
- snapdragon_429_mobile_firmware
- wcd9380
- fastconnect_7800_firmware
- wsa8830_firmware
- wcn3620_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')