cve/2021/CVE-2021-1905.md

45 lines
3.8 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-1905](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1905)
![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=APQ8009%2C%20APQ8009W%2C%20APQ8017%2C%20APQ8053%2C%20APQ8064AU%2C%20APQ8096AU%2C%20AQT1000%2C%20AR8031%2C%20AR8035%2C%20AR8151%2C%20CSRA6620%2C%20CSRA6640%2C%20FSM10055%2C%20FSM10056%2C%20MDM9206%2C%20MDM9607%2C%20MDM9626%2C%20MDM9628%2C%20MDM9650%2C%20MSM8909W%2C%20MSM8917%2C%20MSM8953%2C%20MSM8996AU%2C%20PM215%2C%20PM3003A%2C%20PM4125%2C%20PM4250%2C%20PM439%2C%20PM456%2C%20PM6125%2C%20PM6150%2C%20PM6150A%2C%20PM6150L%2C%20PM6250%2C%20PM6350%2C%20PM640A%2C%20PM640L%2C%20PM640P%2C%20PM660%2C%20PM660A%2C%20PM660L%2C%20PM670%2C%20PM670A%2C%20PM670L%2C%20PM7150A%2C%20PM7150L%2C%20PM7250%2C%20PM7250B%2C%20PM8004%2C%20PM8005%2C%20PM8008%2C%20PM8009%2C%20PM8150%2C%20PM8150A%2C%20PM8150B%2C%20PM8150C%2C%20PM8150L%2C%20PM8250%2C%20PM8350%2C%20PM8350B%2C%20PM8350BH%2C%20PM8350C%2C%20PM855%2C%20PM855A%2C%20PM855B%2C%20PM855L%2C%20PM855P%2C%20PM8909%2C%20PM8916%2C%20PM8937%2C%20PM8953%2C%20PM8998%2C%20PMC1000H%2C%20PMD9607%2C%20PMD9655%2C%20PME605%2C%20PMI632%2C%20PMI8937%2C%20PMI8952%2C%20PMI8998%2C%20PMK8002%2C%20PMK8003%2C%20PMK8350%2C%20PMM6155AU%2C%20PMM8155AU%2C%20PMM8195AU%2C%20PMM855AU%2C%20PMM8920AU%2C%20PMM8996AU%2C%20PMR525%2C%20PMR735A%2C%20PMR735B%2C%20PMW3100%2C%20PMX20%2C%20PMX24%2C%20PMX50%2C%20PMX55%2C%20QAT3514%2C%20QAT3516%2C%20QAT3518%2C%20QAT3519%2C%20QAT3522%2C%20QAT3550%2C%20QAT3555%2C%20QAT5515%2C%20QAT5516%2C%20QAT5522%2C%20QAT5533%2C%20QAT5568%2C%20QBT1000%2C%20QBT1500%2C%20QBT2000%2C%20QCA4020%2C%20QCA6174%2C%20QCA6174A%2C%20QCA%20...%5Btruncated*%5D%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20After%20Free%20in%20Graphics&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
### POC
#### Reference
- https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
2025-09-29 21:09:30 +02:00
- https://github.com/khnhdz/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/manas3c/CVE-POC
2024-08-11 18:44:53 +00:00
- https://github.com/ndk06/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
2024-06-22 09:37:59 +00:00
- https://github.com/wkhnh06/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve