CVE-2024-33070 – Buffer Over-read in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2024-33070
Transient DOS while parsing ESP IE from beacon/probe response frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-33069 – Use After Free in WLAN Host
https://notcve.org/view.php?id=CVE-2024-33069
Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-416: Use After Free •
CVE-2024-33049 – Buffer Over-read in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2024-33049
Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-20094
https://notcve.org/view.php?id=CVE-2024-20094
This could lead to remote denial of service with no additional execution privileges needed. • https://corp.mediatek.com/product-security-bulletin/October-2024 • CWE-617: Reachable Assertion •
CVE-2024-0125
https://notcve.org/view.php?id=CVE-2024-0125
A successful exploit of this vulnerability might lead to a limited denial of service. • https://nvidia.custhelp.com/app/answers/detail/a_id/5577 • CWE-476: NULL Pointer Dereference •