CVE-2024-6381 – MongoDB C Driver bson_strfreev may be susceptible to integer overflow
https://notcve.org/view.php?id=CVE-2024-6381
The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. • https://jira.mongodb.org/browse/CDRIVER-5622 • CWE-680: Integer Overflow to Buffer Overflow •
CVE-2024-23372 – Integer Overflow or Wraparound in Graphics
https://notcve.org/view.php?id=CVE-2024-23372
Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size. La memoria se daña al invocar una llamada IOCTL para la asignación de memoria de la GPU y el parámetro de tamaño es mayor que el tamaño esperado. • https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html • CWE-190: Integer Overflow or Wraparound •
CVE-2024-21466 – Integer Underflow (Wrap or Wraparound) in WLAN Host Communication
https://notcve.org/view.php?id=CVE-2024-21466
Information disclosure while parsing sub-IE length during new IE generation. Divulgación de información al analizar la longitud sub-IE durante la nueva generación de IE. • https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2024-6285 – Integer Underflow in Memory Range Check in Renesas RCAR
https://notcve.org/view.php?id=CVE-2024-6285
Integer Underflow (Wrap or Wraparound) vulnerability in Renesas arm-trusted-firmware. An integer underflow in image range check calculations could lead to bypassing address restrictions and loading of images to unallowed addresses. • https://asrg.io/security-advisories/cve-2024-6285 https://github.com/renesas-rcar/arm-trusted-firmware/commit/b596f580637bae919b0ac3a5471422a1f756db3b • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2024-37305 – Buffer overflow in deserialization in oqs-provider
https://notcve.org/view.php?id=CVE-2024-37305
oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. • https://github.com/open-quantum-safe/oqs-provider/pull/416 https://github.com/open-quantum-safe/oqs-provider/security/advisories/GHSA-pqvr-5cr8-v6fx • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-130: Improper Handling of Length Parameter Inconsistency CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow CWE-805: Buffer Access with Incorrect Length Value •