Vulnerabilities > Out-of-bounds Read
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-09 | CVE-2024-27368 | Out-of-bounds Read vulnerability in Samsung products An issue was discovered in Samsung Mobile Processor Exynos Mobile Processor, Wearable Processor Exynos 980, Exynos 850, Exynos 1080, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 1480, Exynos W920, Exynos W930. | 5.5 |
2024-09-05 | CVE-2024-43110 | Out-of-bounds Read vulnerability in Freebsd The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. | 8.8 |
2024-09-04 | CVE-2024-20505 | Out-of-bounds Read vulnerability in Clamav A vulnerability in the PDF parsing module of Clam AntiVirus (ClamAV) versions 1.4.0, 1.3.2 and prior versions, all 1.2.x versions, 1.0.6 and prior versions, all 0.105.x versions, all 0.104.x versions, and 0.103.11 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an out of bounds read. | 7.5 |
2024-09-04 | CVE-2024-44993 | Out-of-bounds Read vulnerability in Linux Kernel In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Fix out-of-bounds read in `v3d_csd_job_run()` When enabling UBSAN on Raspberry Pi 5, we get the following warning: [ 387.894977] UBSAN: array-index-out-of-bounds in drivers/gpu/drm/v3d/v3d_sched.c:320:3 [ 387.903868] index 7 is out of range for type '__u32 [7]' [ 387.909692] CPU: 0 PID: 1207 Comm: kworker/u16:2 Tainted: G WC 6.10.3-v8-16k-numa #151 [ 387.919166] Hardware name: Raspberry Pi 5 Model B Rev 1.0 (DT) [ 387.925961] Workqueue: v3d_csd drm_sched_run_job_work [gpu_sched] [ 387.932525] Call trace: [ 387.935296] dump_backtrace+0x170/0x1b8 [ 387.939403] show_stack+0x20/0x38 [ 387.942907] dump_stack_lvl+0x90/0xd0 [ 387.946785] dump_stack+0x18/0x28 [ 387.950301] __ubsan_handle_out_of_bounds+0x98/0xd0 [ 387.955383] v3d_csd_job_run+0x3a8/0x438 [v3d] [ 387.960707] drm_sched_run_job_work+0x520/0x6d0 [gpu_sched] [ 387.966862] process_one_work+0x62c/0xb48 [ 387.971296] worker_thread+0x468/0x5b0 [ 387.975317] kthread+0x1c4/0x1e0 [ 387.978818] ret_from_fork+0x10/0x20 [ 387.983014] ---[ end trace ]--- This happens because the UAPI provides only seven configuration registers and we are reading the eighth position of this u32 array. Therefore, fix the out-of-bounds read in `v3d_csd_job_run()` by accessing only seven positions on the '__u32 [7]' array. | 7.1 |
2024-09-04 | CVE-2024-34658 | Out-of-bounds Read vulnerability in Samsung Notes Out-of-bounds read in Samsung Notes allows local attackers to bypass ASLR. | 7.1 |
2024-09-02 | CVE-2024-33043 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while handling PS event when Program Service name length offset value is set to 255. | 5.5 |
2024-09-02 | CVE-2024-33047 | Out-of-bounds Read vulnerability in Qualcomm products Memory corruption when the captureRead QDCM command is invoked from user-space. | 7.8 |
2024-09-02 | CVE-2024-33048 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing the received TID-to-link mapping element of beacon/probe response frame. | 7.5 |
2024-09-02 | CVE-2024-33050 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper. | 7.5 |
2024-09-02 | CVE-2024-33051 | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS while processing TIM IE from beacon frame as there is no check for IE length. | 7.5 |