CVE-2022-33226 – Buffer copy without checking the size of input in Core
https://notcve.org/view.php?id=CVE-2022-33226
Memory corruption due to buffer copy without checking the size of input in Core while processing ioctl commands from diag client applications. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-33224 – Buffer copy without checking the size of input in Core
https://notcve.org/view.php?id=CVE-2022-33224
Memory corruption in core due to buffer copy without check9ing the size of input while processing ioctl queries. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-22076 – Cryptographic issue in Core
https://notcve.org/view.php?id=CVE-2022-22076
information disclosure due to cryptographic issue in Core during RPMB read request. • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-310: Cryptographic Issues •
CVE-2022-22060 – Reachable Assertion in Modem
https://notcve.org/view.php?id=CVE-2022-22060
Assertion occurs while processing Reconfiguration message due to improper validation • https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin • CWE-617: Reachable Assertion •
CVE-2022-40504 – Reachable assertion in Modem
https://notcve.org/view.php?id=CVE-2022-40504
Transient DOS due to reachable assertion in Modem when UE received Downlink Data Indication message from the network. • https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin • CWE-617: Reachable Assertion •