CVE-2022-33289 – Improper validation of array index in Modem
https://notcve.org/view.php?id=CVE-2022-33289
Memory corruption occurs in Modem due to improper validation of array index when malformed APDU is sent from card. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-129: Improper Validation of Array Index •
CVE-2022-33288 – Buffer copy without checking the size of input in Core
https://notcve.org/view.php?id=CVE-2022-33288
Memory corruption due to buffer copy without checking the size of input in Core while sending SCM command to get write protection information. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-33269 – Integer overflow or wraparound in Core
https://notcve.org/view.php?id=CVE-2022-33269
Memory corruption due to integer overflow or wraparound in Core while DDR memory assignment. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-190: Integer Overflow or Wraparound •
CVE-2022-33231 – Double free in Core
https://notcve.org/view.php?id=CVE-2022-33231
Memory corruption due to double free in core while initializing the encryption key. • https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin • CWE-415: Double Free •
CVE-2021-30327
https://notcve.org/view.php?id=CVE-2021-30327
Buffer overflow in sahara protocol while processing commands leads to overwrite of secure configuration data in Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music Un desbordamiento del búfer en el protocolo sahara mientras son procesados comandos conlleva a una escritura excesiva de datos de configuración seguros en Snapdragon Mobile, Snapdragon Compute, Snapdragon Auto, Snapdragon IOT, Snapdragon Connectivity, Snapdragon Voice & Music • https://www.qualcomm.com/company/product-security/bulletins/april-2022-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •