CVE-2023-28549 – Improper Restriction of Operations within the Bounds of a Memory Buffer in WLAN HAL
https://notcve.org/view.php?id=CVE-2023-28549
Memory corruption in WLAN HAL while parsing Rx buffer in processing TLV payload. Corrupción de memoria en WLAN HAL al analizar el búfer Rx en el procesamiento del payload TLV. • https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2023-28548 – Improper Validation of Array Index in WLAN HAL
https://notcve.org/view.php?id=CVE-2023-28548
Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART. Corrupción de memoria en WLAN HAL al procesar comandos Tx/Rx desde QDART. • https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin • CWE-129: Improper Validation of Array Index •
CVE-2023-21664 – Buffer Copy without Checking the Size of Input(Classic Buffer Overflow) in Core Platform
https://notcve.org/view.php?id=CVE-2023-21664
Memory Corruption in Core Platform while printing the response buffer in log. Corrupción de la memoria en Core Platform al imprimir el búfer de respuesta en el registro. • https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •
CVE-2023-21662 – Buffer Copy without Checking the Size of Input(Classic Buffer Overflow) in Core Platform
https://notcve.org/view.php?id=CVE-2023-21662
Memory corruption in Core Platform while printing the response buffer in log. Corrupción de la memoria en Core Platform al imprimir el búfer de respuesta en el registro. • https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-21646 – Reachable Assertion in Modem
https://notcve.org/view.php?id=CVE-2023-21646
Transient DOS in Modem while processing invalid System Information Block 1. Un ataque de denegación de servicios (DOS) transitorio en Modem cuando se procesa información inválida del sistema Block 1. • https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin • CWE-617: Reachable Assertion •