
CVE-2023-33060 – Buffer Over-read in Core
https://notcve.org/view.php?id=CVE-2023-33060
06 Feb 2024 — Transient DOS in Core when DDR memory check is called while DDR is not initialized. DOS transitorio en Core cuando se llama a la verificación de la memoria DDR mientras DDR no está inicializado. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2023-33058 – Buffer Copy Without Checking Size of Input in Modem
https://notcve.org/view.php?id=CVE-2023-33058
06 Feb 2024 — Information disclosure in Modem while processing SIB5. Divulgación de información en Modem durante el procesamiento SIB5. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2023-33057 – Improper Input Validation in Multi-Mode Call Processor
https://notcve.org/view.php?id=CVE-2023-33057
06 Feb 2024 — Transient DOS in Multi-Mode Call Processor while processing UE policy container. DOS transitorio en el procesador de llamadas multimodo mientras se procesa el contenedor de políticas UE. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-20: Improper Input Validation •

CVE-2023-33049 – Improper Release of Memory Before Removing Last Reference in Multi-Mode Call Processor
https://notcve.org/view.php?id=CVE-2023-33049
06 Feb 2024 — Transient DOS in Multi-Mode Call Processor due to UE failure because of heap leakage. DOS transitorio en el procesador de llamadas multimodo debido a una falla del UE debido a una fuga de montón. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2023-33046 – Time-of-check Time-of-use (TOCTOU) Race Condition in Trusted Execution Environment
https://notcve.org/view.php?id=CVE-2023-33046
06 Feb 2024 — Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation. Corrupción de la memoria en Trusted Execution Environment al desinicializar un objeto utilizado para la validación de la licencia. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition CWE-787: Out-of-bounds Write •

CVE-2023-43511 – Loop with Unreachable Exit Condition (Infinite Loop) in WLAN Firmware
https://notcve.org/view.php?id=CVE-2023-43511
02 Jan 2024 — Transient DOS while parsing IPv6 extension header when WLAN firmware receives an IPv6 packet that contains `IPPROTO_NONE` as the next header. DOS transitorio mientras se analiza el encabezado de extensión IPv6 cuando el firmware WLAN recibe un paquete IPv6 que contiene "IPPROTO_NONE" como el siguiente encabezado. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2023-33116 – Buffer over-read without Checking Size of Input in WLAN Host
https://notcve.org/view.php?id=CVE-2023-33116
02 Jan 2024 — Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver. DOS transitorio mientras se analiza ieee80211_parse_mscs_ie en el controlador WIN WLAN. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2023-33113 – Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Kernel
https://notcve.org/view.php?id=CVE-2023-33113
02 Jan 2024 — Memory corruption when resource manager sends the host kernel a reply message with multiple fragments. Corrupción de la memoria cuando el administrador de recursos envía al kernel del host un mensaje de respuesta con múltiples fragmentos. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2023-33112 – Buffer Over-read in WLAN Firmware
https://notcve.org/view.php?id=CVE-2023-33112
02 Jan 2024 — Transient DOS when WLAN firmware receives "reassoc response" frame including RIC_DATA element. DOS transitorio cuando el firmware WLAN recibe una trama de "reassoc response" que incluye el elemento RIC_DATA. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-126: Buffer Over-read •

CVE-2023-33110 – Use of Out-of-range Pointer Offset in Audio
https://notcve.org/view.php?id=CVE-2023-33110
02 Jan 2024 — The session index variable in PCM host voice audio driver initialized before PCM open, accessed during event callback from ADSP and reset during PCM close may lead to race condition between event callback - PCM close and reset session index causing memory corruption. La variable de índice de sesión en el controlador de audio de voz del host PCM que se inicializa antes de abrir el PCM, a la que se accede durante la devolución de llamada de evento desde ADSP y se restablece durante el cierre de PCM puede prov... • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-823: Use of Out-of-range Pointer Offset •