
CVE-2024-33035 – Integer Overflow or Wraparound in Display
https://notcve.org/view.php?id=CVE-2024-33035
02 Sep 2024 — Memory corruption while calculating total metadata size when a very high reserved size is requested by gralloc clients. • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-190: Integer Overflow or Wraparound •

CVE-2024-28044 – Liteos-A has an integer overflow vulnerability
https://notcve.org/view.php?id=CVE-2024-28044
02 Sep 2024 — in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow. en OpenHarmony v4.1.0 y versiones anteriores, se permite que un atacante local provoque un bloqueo a través de un desbordamiento de enteros. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-09.md • CWE-190: Integer Overflow or Wraparound •

CVE-2024-45490 – libexpat: Negative Length Parsing Vulnerability in libexpat
https://notcve.org/view.php?id=CVE-2024-45490
30 Aug 2024 — Shang-Hung Wan discovered that Expat, contained within the xmltok library, did properly handle the potential for an integer overflow on 32-bit platforms. • https://github.com/libexpat/libexpat/issues/887 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-45491 – libexpat: Integer Overflow or Wraparound
https://notcve.org/view.php?id=CVE-2024-45491
30 Aug 2024 — An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). An issue was found in libexpat’s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX. ... Shang-Hung Wan discovered that Expat, contained within the xmltok library, did properly handle the potential for an integer

CVE-2024-45492 – libexpat: integer overflow
https://notcve.org/view.php?id=CVE-2024-45492
30 Aug 2024 — An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). ... It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX. • https://github.com/nidhihcl75/external_expat_2.6.2_CVE-2024-45492 • CWE-190: Integer Overflow or Wraparound •

CVE-2022-48938 – CDC-NCM: avoid overflow in sanity checking
https://notcve.org/view.php?id=CVE-2022-48938
22 Aug 2024 — In the sanity check as formulated now, this will create an integer overflow, defeating the sanity check. • https://git.kernel.org/stable/c/a612395c7631918e0e10ea48b9ce5ab4340f26a6 •

CVE-2024-43856 – dma: fix call order in dmam_free_coherent
https://notcve.org/view.php?id=CVE-2024-43856
17 Aug 2024 — Fix by destroying the devres entry before freeing the DMA allocation. kokonut //net/encryption http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03 Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an integer overflow vulnerability. • https://git.kernel.org/stable/c/9ac7849e35f705830f7b016ff272b0ff1f7ff759 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2024-43828 – ext4: fix infinite loop when replaying fast_commit
https://notcve.org/view.php?id=CVE-2024-43828
17 Aug 2024 — Because 'es' contains garbage, an integer overflow may happen causing an infinite loop in this function, easily reproducible using fstest generic/039. ... Because 'es' contains garbage, an integer overflow may happen causing an infinite loop in this function, easily reproducible using fstest generic/039. • https://git.kernel.org/stable/c/8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2 •

CVE-2024-34740
https://notcve.org/view.php?id=CVE-2024-34740
15 Aug 2024 — In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow. • https://android.googlesource.com/platform/frameworks/base/+/e8b6505647be558ed3a167a1e13c53dfc227d22b • CWE-91: XML Injection (aka Blind XPath Injection) CWE-190: Integer Overflow or Wraparound •

CVE-2024-31333
https://notcve.org/view.php?id=CVE-2024-31333
15 Aug 2024 — In _MMU_AllocLevel of mmu_common.c, there is a possible arbitrary code execution due to an integer overflow. • https://source.android.com/security/bulletin/2024-08-01 • CWE-190: Integer Overflow or Wraparound •