CVE-2022-33263 – Use after free in Core
https://notcve.org/view.php?id=CVE-2022-33263
Memory corruption due to use after free in Core when multiple DCI clients register and deregister. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-416: Use After Free •
CVE-2022-33251 – Reachable assertion in Modem
https://notcve.org/view.php?id=CVE-2022-33251
Transient DOS due to reachable assertion in Modem because of invalid network configuration. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-617: Reachable Assertion •
CVE-2022-33227 – Double free in Linux-Android
https://notcve.org/view.php?id=CVE-2022-33227
Memory corruption in Linux android due to double free while calling unregister provider after register call. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-415: Double Free •
CVE-2022-33226 – Buffer copy without checking the size of input in Core
https://notcve.org/view.php?id=CVE-2022-33226
Memory corruption due to buffer copy without checking the size of input in Core while processing ioctl commands from diag client applications. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-33224 – Buffer copy without checking the size of input in Core
https://notcve.org/view.php?id=CVE-2022-33224
Memory corruption in core due to buffer copy without check9ing the size of input while processing ioctl queries. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •