CVE-2024-33020 – Buffer Over-read in WLAN HOST
https://notcve.org/view.php?id=CVE-2024-33020
Transient DOS while processing TID-to-link mapping IE elements. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-33019 – Buffer Over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2024-33019
Transient DOS while parsing the received TID-to-link mapping action frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-33018 – Buffer Over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2024-33018
Transient DOS while parsing the received TID-to-link mapping element of the TID-to-link mapping action frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-33015 – Buffer Over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2024-33015
Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-33014 – Buffer Over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2024-33014
Transient DOS while parsing ESP IE from beacon/probe response frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •