Qualcomm Adreno GPU Memory Fault via Fence Dereg & Signal
CVE-2025-47374 Published on April 6, 2026
Use After Free in Camera Driver
Memory Corruption when accessing freed memory due to concurrent fence deregistration and signal handling.
Vulnerability Analysis
CVE-2025-47374 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a high impact on integrity and availability.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-47374 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2025-47374
Want to know whenever a new CVE is published for Qualcomm Snapdragon? stack.watch will email you.
Affected Versions
Qualcomm, Inc. Snapdragon:- Version FastConnect 6900 is affected.
- Version FastConnect 7800 is affected.
- Version Pandeiro is affected.
- Version QLN1083BD is affected.
- Version QLN1086BD is affected.
- Version QPA1083BD is affected.
- Version QPA1086BD is affected.
- Version QXM1083 is affected.
- Version QXM1086 is affected.
- Version QXM1093 is affected.
- Version QXM1094 is affected.
- Version QXM1095 is affected.
- Version QXM1096 is affected.
- Version SAR1165P is affected.
- Version SAR2130P is affected.
- Version Snapdragon AR1 Gen 1 Platform is affected.
- Version Snapdragon AR1+ Gen 1 Platform is affected.
- Version SXR2230P is affected.
- Version SXR2250P is affected.
- Version SXR2330P is affected.
- Version SXR2350P is affected.
- Version WCD9380 is affected.
- Version WCD9385 is affected.
- Version WCN7860 is affected.
- Version WCN7861 is affected.
- Version WSA8830 is affected.
- Version WSA8832 is affected.
- Version WSA8835 is affected.
- Version XRV7209 is affected.
- Version XRV9209 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.