
CVE-2024-51540
https://notcve.org/view.php?id=CVE-2024-51540
26 Dec 2024 — Dell ECS, versions prior to 3.8.1.3 contains an arithmetic overflow vulnerability exists in retention period handling of ECS. • https://www.dell.com/support/kbdoc/en-us/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities • CWE-190: Integer Overflow or Wraparound •

CVE-2024-53161 – EDAC/bluefield: Fix potential integer overflow
https://notcve.org/view.php?id=CVE-2024-53161
24 Dec 2024 — In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. In the Linux kernel, the following vulnerability has been resolved: EDAC/bluefield: Fix potential integer overflow The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx left-shifted 16 bits and OR-ed with DIMM index. • https://git.kernel.org/stable/c/82413e562ea6eadfb6de946dcc6f74af31d64e7f • CWE-190: Integer Overflow or Wraparound •

CVE-2024-53151 – svcrdma: Address an integer overflow
https://notcve.org/view.php?id=CVE-2024-53151
24 Dec 2024 — In the Linux kernel, the following vulnerability has been resolved: svcrdma: Address an integer overflow Dan Carpenter reports: > Commit 78147ca8b4a9 ("svcrdma: Add a "parsed chunk list" data > structure") from Jun 22, 2020 (linux-next), leads to the following > Smatch static checker warning: > > net/sunrpc/xprtrdma/svc_rdma_recvfrom.c:498 xdr_check_write_chunk() > warn: potential user controlled sizeof overflow 'segcount * 4 * 4' > > net/sunrpc/xprtrdma/svc_rdma_recvfrom.c > 488 static... • https://git.kernel.org/stable/c/78147ca8b4a9b6cf0e597ddd6bf17959e08376c2 •

CVE-2024-53146 – NFSD: Prevent a potential integer overflow
https://notcve.org/view.php?id=CVE-2024-53146
24 Dec 2024 — In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent a potential integer overflow If the tag length is >= U32_MAX - 3 then the "length + 4" addition can result in an integer overflow. ... In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent a potential integer overflow If the tag length is >= U32_MAX - 3 then the "length + 4" addition can result in an integer overflow. • https://git.kernel.org/stable/c/745f7ce5a95e783ba62fe774325829466aec2aa8 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-53145 – um: Fix potential integer overflow during physmem setup
https://notcve.org/view.php?id=CVE-2024-53145
24 Dec 2024 — In the Linux kernel, the following vulnerability has been resolved: um: Fix potential integer overflow during physmem setup This issue happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386. In the Linux kernel, the following vulnerability has been resolved: um: Fix potential integer overflow during physmem setup This issue happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386. • https://git.kernel.org/stable/c/fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 •

CVE-2024-56375
https://notcve.org/view.php?id=CVE-2024-56375
22 Dec 2024 — An integer underflow was discovered in Fort 1.6.3 and 1.6.4 before 1.6.5. ... This out-of-bounds access is caused by an integer underflow that causes the surrounding loop to iterate infinitely. • https://nicmx.github.io/FORT-validator/CVE.html • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-55626 – Suricata oversized bpf file can lead to buffer overflow
https://notcve.org/view.php?id=CVE-2024-55626
12 Dec 2024 — Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at Suricata startup. • https://github.com/OISF/suricata/commit/dd71ef0af222a566e54dfc479dd1951dd17d7ceb • CWE-680: Integer Overflow to Buffer Overflow •

CVE-2024-55627 – Suricata segfault on StreamingBufferSlideToOffsetWithRegions
https://notcve.org/view.php?id=CVE-2024-55627
12 Dec 2024 — Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. • https://github.com/OISF/suricata/commit/282509f70c4ce805098e59535af445362e3e9ebd • CWE-122: Heap-based Buffer Overflow CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-44243 – Apple Security Advisory 12-11-2024-3
https://notcve.org/view.php?id=CVE-2024-44243
11 Dec 2024 — An app may be able to modify protected parts of the file system. macOS Sonoma 14.7.3 addresses bypass, code execution, integer overflow, out of bounds read, and out of bounds write vulnerabilities. • https://support.apple.com/en-us/121839 •

CVE-2024-47834 – GHSL-2024-280: Gstreamer Use-After-Free read in Matroska CodecPrivate
https://notcve.org/view.php?id=CVE-2024-47834
11 Dec 2024 — Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. Fixed an integer underflow in extract_cc_from_data leading to out-of-bounds read. Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. ... Avoid integer overflow when allocating sysmem. ... Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch • CWE-416: Use After Free •