
CVE-2022-49199 – RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
https://notcve.org/view.php?id=CVE-2022-49199
26 Feb 2025 — In the Linux kernel, the following vulnerability has been resolved: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() This code checks "index" for an upper bound but it does not check for negatives. Change the type to unsigned to prevent underflows. • https://git.kernel.org/stable/c/3c3c1f1416392382faa0238e76a70d7810aab2ef • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2025-0690 – Grub2: read: integer overflow may lead to out-of-bounds write
https://notcve.org/view.php?id=CVE-2025-0690
24 Feb 2025 — The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. • https://access.redhat.com/security/cve/CVE-2025-0690 • CWE-787: Out-of-bounds Write •

CVE-2025-0838 – Heap Buffer overflow in Abseil
https://notcve.org/view.php?id=CVE-2025-0838
21 Feb 2025 — There exists a heap buffer overflow vulnerable in Abseil-cpp. ... As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. • https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 • CWE-190: Integer Overflow or Wraparound •

CVE-2025-0727 – Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow
https://notcve.org/view.php?id=CVE-2025-0727
21 Feb 2025 — In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. • https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2025-0728 – Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow
https://notcve.org/view.php?id=CVE-2025-0728
21 Feb 2025 — In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. • https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2025-0677 – Grub2: ufs: integer overflow may lead to heap based out-of-bounds write when handling symlinks
https://notcve.org/view.php?id=CVE-2025-0677
19 Feb 2025 — A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malici... • https://access.redhat.com/security/cve/CVE-2025-0677 • CWE-787: Out-of-bounds Write •

CVE-2024-45777 – Grub2: grub-core/gettext: integer overflow leads to heap oob write.
https://notcve.org/view.php?id=CVE-2024-45777
19 Feb 2025 — The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. • https://access.redhat.com/security/cve/CVE-2024-45777 • CWE-787: Out-of-bounds Write •

CVE-2024-57262
https://notcve.org/view.php?id=CVE-2024-57262
19 Feb 2025 — In barebox before 2025.01.0, ext4fs_read_symlink has an integer overflow for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite, a related issue to CVE-2024-57256. • https://git.pengutronix.de/cgit/barebox/commit/?id=a2b76550f7d8 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-57261
https://notcve.org/view.php?id=CVE-2024-57261
19 Feb 2025 — In barebox before 2025.01.0, request2size in common/dlmalloc.c has an integer overflow, a related issue to CVE-2024-57258. • https://git.pengutronix.de/cgit/barebox/commit/?id=7cf25e0733f08f68d1bf0ca0c3cf6e2dfe51bd3c • CWE-190: Integer Overflow or Wraparound •

CVE-2024-45776 – Grub2: grub-core/gettext: integer overflow leads to heap oob write and read.
https://notcve.org/view.php?id=CVE-2024-45776
18 Feb 2025 — When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. • https://access.redhat.com/security/cve/CVE-2024-45776 • CWE-787: Out-of-bounds Write •