![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-38421 – Use After Free in Graphics Linux
https://notcve.org/view.php?id=CVE-2024-38421
04 Nov 2024 — Memory corruption while processing GPU commands. • https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-38405 – Buffer Over-read in WLAN Host
https://notcve.org/view.php?id=CVE-2024-38405
04 Nov 2024 — Transient DOS while processing the CU information from RNR IE. • https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html • CWE-126: Buffer Over-read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-23377 – Use of Out-of-range Pointer Offset in ComputerVision
https://notcve.org/view.php?id=CVE-2024-23377
04 Nov 2024 — Memory corruption while invoking IOCTL command from user-space, when a user modifies the original packet size of the command after system properties have been already sent to the EVA driver. • https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html • CWE-823: Use of Out-of-range Pointer Offset •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-33020 – Buffer Over-read in WLAN HOST
https://notcve.org/view.php?id=CVE-2024-33020
05 Aug 2024 — Transient DOS while processing TID-to-link mapping IE elements. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-23383 – Use After Free in Graphics Linux
https://notcve.org/view.php?id=CVE-2024-23383
05 Aug 2024 — Memory corruption when kernel driver attempts to trigger hardware fences. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-23381 – Use After Free in Graphics Linux
https://notcve.org/view.php?id=CVE-2024-23381
05 Aug 2024 — Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-23368 – Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in Qualcomm IPC
https://notcve.org/view.php?id=CVE-2024-23368
01 Jul 2024 — Memory corruption when allocating and accessing an entry in an SMEM partition. Corrupción de la memoria al asignar y acceder a una entrada en una partición SMEM. • https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-43536 – Buffer Over-read in WLAN Firmware
https://notcve.org/view.php?id=CVE-2023-43536
06 Feb 2024 — Transient DOS while parse fils IE with length equal to 1. DOS transitorio mientras analiza fils IE con una longitud igual a 1. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-126: Buffer Over-read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-43534 – Use of Out-of-range Pointer Offset in WLAN HOST
https://notcve.org/view.php?id=CVE-2023-43534
06 Feb 2024 — Memory corruption while validating the TID to Link Mapping action request frame, when a station connects to an access point. Corrupción de la memoria al validar el TID para el frame de solicitud de acción de Mapeo de enlaces, cuando una estación se conecta a un punto de acceso. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-823: Use of Out-of-range Pointer Offset •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-43520 – Stack-based Buffer Overflow in WLAN HOST
https://notcve.org/view.php?id=CVE-2023-43520
06 Feb 2024 — Memory corruption when AP includes TID to link mapping IE in the beacons and STA is parsing the beacon TID to link mapping IE. Corrupción de la memoria cuando AP incluye TID para vincular el IE de mapeo en las balizas y STA está analizando el TID de baliza para vincular el IE de mapeo. • https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •