CVE-2022-40531 – Incorrect type conversion in WLAN
https://notcve.org/view.php?id=CVE-2022-40531
Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-704: Incorrect Type Conversion or Cast •
CVE-2022-40530 – Integer overflow to buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-40530
Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •
CVE-2022-33272 – Reachable assertion in Modem
https://notcve.org/view.php?id=CVE-2022-33272
Transient DOS in modem due to reachable assertion. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •
CVE-2022-33256 – Improper validation of array index in Multi-mode call processor
https://notcve.org/view.php?id=CVE-2022-33256
Memory corruption due to improper validation of array index in Multi-mode call processor. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-129: Improper Validation of Array Index •
CVE-2022-33254 – Reachable assertion in Modem
https://notcve.org/view.php?id=CVE-2022-33254
Transient DOS due to reachable assertion in Modem while processing SIB1 Message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •