
CVE-2023-21627 – Incorrect Type Conversion or Cast in Trusted Execution Environment
https://notcve.org/view.php?id=CVE-2023-21627
08 Aug 2023 — Memory corruption in Trusted Execution Environment while calling service API with invalid address. Corrupción de memoria en Trusted Execution Environment al llamar a la API de servicio con una dirección no válida. • https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin • CWE-20: Improper Input Validation CWE-704: Incorrect Type Conversion or Cast •

CVE-2022-40510 – Buffer copy without checking size of input in Audio.
https://notcve.org/view.php?id=CVE-2022-40510
08 Aug 2023 — Memory corruption due to buffer copy without checking size of input in Audio while voice call with EVS vocoder. Corrupción de memoria debida a la copia del búfer sin comprobar el tamaño de la entrada en Audio durante una llamada de voz con el vocoder EVS. • https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin • CWE-457: Use of Uninitialized Variable CWE-787: Out-of-bounds Write •

CVE-2022-40540 – Buffer copy without checking the size of input in Linux Kernel
https://notcve.org/view.php?id=CVE-2022-40540
07 Mar 2023 — Memory corruption due to buffer copy without checking the size of input while loading firmware in Linux Kernel. • https://bugzilla.suse.com/show_bug.cgi?id=1209597 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-40537 – Improper Validation of Array Index in Bluetooth HOST
https://notcve.org/view.php?id=CVE-2022-40537
07 Mar 2023 — Memory corruption in Bluetooth HOST while processing the AVRC_PDU_GET_PLAYER_APP_VALUE_TEXT AVRCP response. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-129: Improper Validation of Array Index •

CVE-2022-40531 – Incorrect type conversion in WLAN
https://notcve.org/view.php?id=CVE-2022-40531
07 Mar 2023 — Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-704: Incorrect Type Conversion or Cast •

CVE-2022-40530 – Integer overflow to buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-40530
07 Mar 2023 — Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVE-2022-40527 – Reachable Assertion in WLAN Embedded SW
https://notcve.org/view.php?id=CVE-2022-40527
07 Mar 2023 — Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •

CVE-2022-40515 – Double free in Video
https://notcve.org/view.php?id=CVE-2022-40515
07 Mar 2023 — Memory corruption in Video due to double free while playing 3gp clip with invalid metadata atoms. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-415: Double Free •

CVE-2022-33309 – Buiffer over-read in WLAN Firmware.
https://notcve.org/view.php?id=CVE-2022-33309
07 Mar 2023 — Transient DOS due to buffer over-read in WLAN Firmware while parsing secure FTMR frame with size lesser than 39 Bytes. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2022-33278 – Buffer copy without checking the size of input in HLOS
https://notcve.org/view.php?id=CVE-2022-33278
07 Mar 2023 — Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •