Vulnerabilities > Integer Overflow or Wraparound
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-02-07 | CVE-2025-0302 | Integer Overflow or Wraparound vulnerability in Openatom Openharmony 4.1.0/4.1.1 in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow. | 5.5 |
2025-01-27 | CVE-2025-24156 | Integer Overflow or Wraparound vulnerability in Apple Macos An integer overflow was addressed through improved input validation. | 7.8 |
2025-01-21 | CVE-2024-57938 | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: net/sctp: Prevent autoclose integer overflow in sctp_association_init() While by default max_autoclose equals to INT_MAX / HZ, one may set net.sctp.max_autoclose to UINT_MAX. | 5.5 |
2025-01-15 | CVE-2024-57890 | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: RDMA/uverbs: Prevent integer overflow issue In the expression "cmd.wqe_size * cmd.wr_count", both variables are u32 values that come from the user so the multiplication can lead to integer wrapping. | 5.5 |
2025-01-14 | CVE-2024-46669 | Integer Overflow or Wraparound vulnerability in Fortinet Fortios An Integer Overflow or Wraparound vulnerability [CWE-190] in version 7.4.4 and below, version 7.2.10 and below; FortiSASE version 23.4.b FortiOS tenant IPsec IKE service may allow an authenticated attacker to crash the IPsec tunnel via crafted requests, resulting in potential denial of service. | 6.5 |
2025-01-10 | CVE-2025-23022 | Integer Overflow or Wraparound vulnerability in Freetype 2.8.1 FreeType 2.8.1 has a signed integer overflow in cf2_doFlex in cff/cf2intrp.c. | 6.2 |
2025-01-08 | CVE-2024-56451 | Integer Overflow or Wraparound vulnerability in Huawei Harmonyos 5.0.0 Integer overflow vulnerability during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. | 5.5 |
2025-01-06 | CVE-2024-45555 | Integer Overflow or Wraparound vulnerability in Qualcomm products Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. | 7.8 |
2024-12-27 | CVE-2024-53187 | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: syz-executor825 Not tainted 6.12.0-next-20241118-syzkaller #0 Call Trace: <TASK> __io_uaddr_map+0xfb/0x2d0 io_uring/memmap.c:183 io_rings_map io_uring/io_uring.c:2611 [inline] io_allocate_scq_urings+0x1c0/0x650 io_uring/io_uring.c:3470 io_uring_create+0x5b5/0xc00 io_uring/io_uring.c:3692 io_uring_setup io_uring/io_uring.c:3781 [inline] ... </TASK> io_pin_pages()'s uaddr parameter came directly from the user and can be garbage. | 5.5 |
2024-12-26 | CVE-2024-51540 | Integer Overflow or Wraparound vulnerability in Dell Elastic Cloud Storage Dell ECS, versions prior to 3.8.1.3 contains an arithmetic overflow vulnerability exists in retention period handling of ECS. | 6.5 |