CVE-2022-40502 – Improper input validation in WLAN Host
https://notcve.org/view.php?id=CVE-2022-40502
Transient DOS due to improper input validation in WLAN Host. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-20: Improper Input Validation •
CVE-2022-34146 – Improper input validation in WLAN Host
https://notcve.org/view.php?id=CVE-2022-34146
Transient DOS due to improper input validation in WLAN Host while parsing frame during defragmentation. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-20: Improper Input Validation •
CVE-2022-34145 – Buffer over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2022-34145
Transient DOS due to buffer over-read in WLAN Host while parsing frame information. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •
CVE-2022-33306 – Buffer over-read in WLAN
https://notcve.org/view.php?id=CVE-2022-33306
Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •
CVE-2022-33277 – Buffer copy without checking size of input in modem
https://notcve.org/view.php?id=CVE-2022-33277
Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command. • https://www.qualcomm.com/company/product-security/bulletins/february-2023-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •