CVE-2022-34146 – Improper input validation in WLAN Host
https://notcve.org/view.php?id=CVE-2022-34146
Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-20: Improper Input Validation •
CVE-2022-34145 – Buffer over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2022-34145
Transient DOS due to buffer over-read in WLAN Host while parsing frame information. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •
CVE-2022-33306 – Buffer over-read in WLAN
https://notcve.org/view.php?id=CVE-2022-33306
Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •
CVE-2022-33279 – Stack based buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-33279
Memory corruption due to stack based buffer overflow in WLAN having invalid WNM frame length. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2022-33277 – Buffer copy without checking size of input in modem
https://notcve.org/view.php?id=CVE-2022-33277
Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •