CVE-2022-40527 – Reachable Assertion in WLAN Embedded SW
https://notcve.org/view.php?id=CVE-2022-40527
Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •
CVE-2022-33278 – Buffer copy without checking the size of input in HLOS
https://notcve.org/view.php?id=CVE-2022-33278
Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-33272 – Reachable assertion in Modem
https://notcve.org/view.php?id=CVE-2022-33272
Transient DOS in modem due to reachable assertion. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-617: Reachable Assertion •
CVE-2022-33257 – Time-of-check time-of-use race condition in Core
https://notcve.org/view.php?id=CVE-2022-33257
Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2022-33256 – Improper validation of array index in Multi-mode call processor
https://notcve.org/view.php?id=CVE-2022-33256
Memory corruption due to improper validation of array index in Multi-mode call processor. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-129: Improper Validation of Array Index •