### [CVE-2021-1891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1891) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=APQ8009W%2C%20APQ8017%2C%20APQ8053%2C%20AQT1000%2C%20AR8031%2C%20AR8035%2C%20AR9380%2C%20CSR8811%2C%20CSRA6620%2C%20CSRA6640%2C%20CSRB31024%2C%20IPQ4018%2C%20IPQ4028%2C%20IPQ4029%2C%20IPQ6000%2C%20IPQ6010%2C%20IPQ6018%2C%20IPQ6028%2C%20IPQ8064%2C%20IPQ8065%2C%20IPQ8068%2C%20IPQ8070%2C%20IPQ8070A%2C%20IPQ8071%2C%20IPQ8071A%2C%20IPQ8072%2C%20IPQ8072A%2C%20IPQ8074%2C%20IPQ8074A%2C%20IPQ8076%2C%20IPQ8076A%2C%20IPQ8078A%2C%20IPQ8173%2C%20IPQ8174%2C%20MSM8909W%2C%20MSM8917%2C%20MSM8953%2C%20PM215%2C%20PM3003A%2C%20PM4125%2C%20PM4250%2C%20PM439%2C%20PM456%2C%20PM6125%2C%20PM6150%2C%20PM6150A%2C%20PM6150L%2C%20PM6250%2C%20PM6350%2C%20PM640A%2C%20PM640L%2C%20PM640P%2C%20PM660%2C%20PM660A%2C%20PM660L%2C%20PM670%2C%20PM670A%2C%20PM670L%2C%20PM7150A%2C%20PM7150L%2C%20PM7250%2C%20PM7250B%2C%20PM7350C%2C%20PM8004%2C%20PM8005%2C%20PM8008%2C%20PM8009%2C%20PM8150%2C%20PM8150A%2C%20PM8150B%2C%20PM8150C%2C%20PM8150L%2C%20PM8250%2C%20PM8350%2C%20PM8350B%2C%20PM8350BH%2C%20PM8350BHS%2C%20PM8350C%2C%20PM855%2C%20PM855B%2C%20PM855L%2C%20PM855P%2C%20PM8909%2C%20PM8916%2C%20PM8937%2C%20PM8953%2C%20PM8998%2C%20PMC1000H%2C%20PMD9655%2C%20PME605%2C%20PMI632%2C%20PMI8937%2C%20PMI8952%2C%20PMI8998%2C%20PMK7350%2C%20PMK8002%2C%20PMK8003%2C%20PMK8350%2C%20PMM6155AU%2C%20PMM8155AU%2C%20PMM8195AU%2C%20PMM855AU%2C%20PMR525%2C%20PMR735A%2C%20PMR735B%2C%20PMW3100%2C%20PMX24%2C%20PMX50%2C%20PMX55%2C%20QAT3514%2C%20QAT3516%2C%20QAT3518%2C%20QAT3519%2C%20QAT3522%2C%20QAT3550%2C%20QAT%20...%5Btruncated*%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Use-After-Free%20in%20Audio&color=brightgreen) ### Description A possible use-after-free occurrence in audio driver can happen when pointers are not properly handled in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin #### Github No PoCs found on GitHub currently.