CVE-2022-40531 – Incorrect type conversion in WLAN
https://notcve.org/view.php?id=CVE-2022-40531
Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-704: Incorrect Type Conversion or Cast •
CVE-2022-40530 – Integer overflow to buffer overflow in WLAN
https://notcve.org/view.php?id=CVE-2022-40530
Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •
CVE-2022-33278 – Buffer copy without checking the size of input in HLOS
https://notcve.org/view.php?id=CVE-2022-33278
Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-33260 – Stack based buffer overflow in Core
https://notcve.org/view.php?id=CVE-2022-33260
Memory corruption due to stack based buffer overflow in core while sending command from USB of large size. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2022-33257 – Time-of-check time-of-use race condition in Core
https://notcve.org/view.php?id=CVE-2022-33257
Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •