CVE-2023-33109 – NULL Pointer Dereference in WLAN Firmware
https://notcve.org/view.php?id=CVE-2023-33109
Transient DOS while processing a WMI P2P listen start command (0xD00A) sent from host. DOS transitorio mientras se procesa un comando de inicio de escucha WMI P2P (0xD00A) enviado desde el host. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-476: NULL Pointer Dereference •
CVE-2023-33108 – Use After Free in Graphics
https://notcve.org/view.php?id=CVE-2023-33108
Memory corruption in Graphics Driver when destroying a context with KGSL_GPU_AUX_COMMAND_TIMELINE objects queued. Corrupción de la memoria en el controlador de gráficos al destruir un contexto con objetos KGSL_GPU_AUX_COMMAND_TIMELINE en cola. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-416: Use After Free •
CVE-2023-33094 – Use After Free in Linux Graphics
https://notcve.org/view.php?id=CVE-2023-33094
Memory corruption while running VK synchronization with KASAN enabled. Corrupción de la memoria al ejecutar la sincronización VK con KASAN habilitado. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-416: Use After Free •
CVE-2023-33085 – Buffer Copy Without Checking Size of Input (Classic Buffer Overflow) in Wearables
https://notcve.org/view.php?id=CVE-2023-33085
Memory corruption in wearables while processing data from AON. Corrupción de la memoria en dispositivos portátiles al procesar datos de AON. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-33062 – Buffer Over-read in WLAN Firmware
https://notcve.org/view.php?id=CVE-2023-33062
Transient DOS in WLAN Firmware while parsing a BTM request. DOS transitorio en el firmware WLAN mientras se analiza una solicitud BTM. • https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin • CWE-126: Buffer Over-read •