CVE-2023-43542 – Buffer Copy Without Checking Size of Input in Trusted Execution Environment
https://notcve.org/view.php?id=CVE-2023-43542
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked. Corrupción de la memoria al copiar el material de un keyblob cuando el tamaño del material de la clave no se verifica con precisión. • https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-43538 – Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in TZ Secure OS
https://notcve.org/view.php?id=CVE-2023-43538
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization. Corrupción de la memoria en TZ Secure OS durante la inicialización de Tunnel Invoke Manager. • https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-43537 – Buffer Over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2023-43537
Information disclosure while handling T2LM Action Frame in WLAN Host. Divulgación de información durante el manejo de la trama de acción T2LM en el host WLAN. • https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-21477 – Buffer Over-read in WLAN Firmware
https://notcve.org/view.php?id=CVE-2024-21477
Transient DOS while parsing a protected 802.11az Fine Time Measurement (FTM) frame. DOS transitorio mientras se analiza un cuadro de medición de tiempo fino (FTM) 802.11az protegido. • https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html • CWE-126: Buffer Over-read •
CVE-2024-21475 – Use of Out-of-range Pointer Offset in Video
https://notcve.org/view.php?id=CVE-2024-21475
Memory corruption when the payload received from firmware is not as per the expected protocol size. Corrupción de la memoria cuando el payload recibido del firmware no corresponde al tamaño de protocolo esperado. • https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html • CWE-823: Use of Out-of-range Pointer Offset •