First published: Mon Feb 03 2025(Updated: )
Memory corruption while invoking IOCTL calls from user-space to kernel-space to handle session errors.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
qualcomm fastconnect 7800 firmware | ||
qualcomm fastconnect 7800 | ||
All of | ||
Qualcomm Snapdragon 8 Gen 3 Firmware | ||
Qualcomm Snapdragon 8 Gen 3 | ||
All of | ||
qualcomm wcd9390 firmware | ||
qualcomm wcd9390 | ||
All of | ||
qualcomm wcd9395 firmware | ||
qualcomm wcd9395 | ||
All of | ||
qualcomm wsa8840 firmware | ||
qualcomm wsa8840 | ||
All of | ||
qualcomm wsa8845 firmware | ||
qualcomm wsa8845 | ||
All of | ||
qualcomm wsa8845h firmware | ||
Qualcomm Wsa8845h |
https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38412 has been assessed with a high severity level due to potential memory corruption risks.
To fix CVE-2024-38412, you should update the affected Qualcomm firmware to the latest version provided by Qualcomm.
The risks associated with CVE-2024-38412 include potential exploitation leading to system instability or unauthorized access through corrupted memory.
CVE-2024-38412 affects specific Qualcomm firmware versions on products like the FastConnect 7800, Snapdragon 8 Gen 3, and WCD9390 series.
As of now, there are no confirmed reports of CVE-2024-38412 being actively exploited in the wild.