CVE-2022-33245 – Use after free in WLAN
https://notcve.org/view.php?id=CVE-2022-33245
Memory corruption in WLAN due to use after free • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-416: Use After Free •
CVE-2022-33242 – Improper authentication in Qualcomm IPC
https://notcve.org/view.php?id=CVE-2022-33242
Memory corruption due to improper authentication in Qualcomm IPC while loading unsigned lib in audio PD. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-287: Improper Authentication •
CVE-2022-25655 – Buffer copy without checking the size of input in WLAN HAL.
https://notcve.org/view.php?id=CVE-2022-25655
Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-22075 – Information Exposure in Graphics
https://notcve.org/view.php?id=CVE-2022-22075
Information Disclosure in Graphics during GPU context switch. • https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-40514 – Buffer copy without checking size of input in WLAN Firmware
https://notcve.org/view.php?id=CVE-2022-40514
Memory corruption due to buffer copy without checking the size of input in WLAN Firmware while processing CCKM IE in reassoc response frame. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •