Vulnerabilities > Integer Overflow or Wraparound
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-02 | CVE-2024-28044 | Integer Overflow or Wraparound vulnerability in Openatom Openharmony 4.0 in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow. | 5.5 |
2024-08-30 | CVE-2024-45491 | Integer Overflow or Wraparound vulnerability in Libexpat Project Libexpat An issue was discovered in libexpat before 2.6.3. | 9.8 |
2024-08-30 | CVE-2024-45492 | Integer Overflow or Wraparound vulnerability in Libexpat Project Libexpat An issue was discovered in libexpat before 2.6.3. | 9.8 |
2024-08-26 | CVE-2024-43890 | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: tracing: Fix overflow in get_free_elt() "tracing_map->next_elt" in get_free_elt() is at risk of overflowing. Once it overflows, new elements can still be inserted into the tracing_map even though the maximum number of elements (`max_elts`) has been reached. Continuing to insert elements after the overflow could result in the tracing_map containing "tracing_map->max_size" elements, leaving no empty entries. If any attempt is made to insert an element into a full tracing_map using `__tracing_map_insert()`, it will cause an infinite loop with preemption disabled, leading to a CPU hang problem. Fix this by preventing any further increments to "tracing_map->next_elt" once it reaches "tracing_map->max_elt". | 5.5 |
2024-08-22 | CVE-2022-48938 | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: CDC-NCM: avoid overflow in sanity checking A broken device may give an extreme offset like 0xFFF0 and a reasonable length for a fragment. | 5.5 |
2024-08-20 | CVE-2024-30949 | Integer Overflow or Wraparound vulnerability in Newlib Project Newlib 4.3.0 An issue in newlib v.4.3.0 allows an attacker to execute arbitrary code via the time unit scaling in the _gettimeofday function. | 9.8 |
2024-08-17 | CVE-2024-43838 | Integer Overflow or Wraparound vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: bpf: fix overflow check in adjust_jmp_off() adjust_jmp_off() incorrectly used the insn->imm field for all overflow check, which is incorrect as that should only be done or the BPF_JMP32 | BPF_JA case, not the general jump instruction case. | 5.5 |
2024-08-15 | CVE-2024-31333 | Integer Overflow or Wraparound vulnerability in Google Android In _MMU_AllocLevel of mmu_common.c, there is a possible arbitrary code execution due to an integer overflow. | 7.8 |
2024-08-15 | CVE-2024-34740 | Integer Overflow or Wraparound vulnerability in Google Android In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow. | 7.8 |
2024-08-15 | CVE-2024-7867 | Integer Overflow or Wraparound vulnerability in Xpdfreader Xpdf In Xpdf 4.05 (and earlier), very large coordinates in a page box can cause an integer overflow and divide-by-zero. | 6.2 |