
CVE-2024-27804 – Apple Security Advisory 05-13-2024-8
https://notcve.org/view.php?id=CVE-2024-27804
13 May 2024 — Una aplicación puede ejecutar código arbitrario con privilegios del kernel. visionOS 1.3 addresses bypass, information leakage, integer overflow, out of bounds access, out of bounds read, and use-after-free vulnerabilities. • https://github.com/R00tkitSMM/CVE-2024-27804 • CWE-1325: Improperly Controlled Sequential Memory Allocation •

CVE-2024-27399 – Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
https://notcve.org/view.php?id=CVE-2024-27399
13 May 2024 — In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout There is a race condition between l2cap_chan_timeout() and l2cap_chan_del(). When we use l2cap_chan_del() to delete the channel, the chan->conn will be set to null. But the conn could be dereferenced again in the mutex_lock() of l2cap_chan_timeout(). As a result the null pointer dereference bug will happen. The KASAN report triggered by POC is shown below: [ 472.074580] ============... • https://git.kernel.org/stable/c/3df91ea20e744344100b10ae69a17211fcf5b207 •

CVE-2024-27393 – xen-netfront: Add missing skb_mark_for_recycle
https://notcve.org/view.php?id=CVE-2024-27393
09 May 2024 — Gui-Dong Han discovered that the software RAID driver in the Linux kernel contained a race condition, leading to an integer overflow vulnerability. • https://git.kernel.org/stable/c/6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c •

CVE-2024-32655 – Npgsql Vulnerable to SQL Injection via Protocol Message Size Overflow
https://notcve.org/view.php?id=CVE-2024-32655
09 May 2024 — Npgsql is the .NET data provider for PostgreSQL. The `WriteBind()` method in `src/Npgsql/Internal/NpgsqlConnector.FrontendMessages.cs` uses `int` variables to store the message length and the sum of parameter lengths. Both variables overflow when the sum of parameter lengths becomes too large. This causes Npgsql to write a message size that is too small when constructing a Postgres protocol message to send it over the network to the database. When parsing the message, the database will only read a small num... • https://github.com/npgsql/npgsql/commit/091655eed0c84e502ab424950c930339d17c1928 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-190: Integer Overflow or Wraparound •

CVE-2024-3757 – Arkcompiler runtime has an integer overflow vulnerability
https://notcve.org/view.php?id=CVE-2024-3757
07 May 2024 — in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-05.md • CWE-190: Integer Overflow or Wraparound •

CVE-2023-43530 – Integer Overflow or Wraparound in HLOS
https://notcve.org/view.php?id=CVE-2023-43530
06 May 2024 — Memory corruption in HLOS while checking for the storage type. Corrupción de la memoria en HLOS al verificar el tipo de almacenamiento. • https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html • CWE-190: Integer Overflow or Wraparound •

CVE-2024-34403
https://notcve.org/view.php?id=CVE-2024-34403
03 May 2024 — ComposeQueryMallocExMm in UriQuery.c has an integer overflow via a long string. • http://www.openwall.com/lists/oss-security/2024/05/06/1 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-34402
https://notcve.org/view.php?id=CVE-2024-34402
03 May 2024 — ComposeQueryEngine in UriQuery.c has an integer overflow via long keys or values, with a resultant buffer overflow. • http://www.openwall.com/lists/oss-security/2024/05/06/1 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-34408
https://notcve.org/view.php?id=CVE-2024-34408
03 May 2024 — Tencent libpag through 4.3.51 has an integer overflow in DecodeStream::checkEndOfFile() in codec/utils/DecodeStream.cpp via a crafted PAG (Portable Animated Graphics) file. • https://github.com/Tencent/libpag/issues/2230 • CWE-122: Heap-based Buffer Overflow •

CVE-2023-47212
https://notcve.org/view.php?id=CVE-2023-47212
01 May 2024 — A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability. Existe una vulnerabilidad de desbordamiento de búfer de almacenamiento dinámico en la funcionalidad de comentarios de stb _vorbis.c v1.22. Un archivo .ogg especialmente manipulado puede provocar una escritura fuera de los límites. • https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHQQXX27ACLLYUQHWSL3DVCOGUK5ZA4 • CWE-190: Integer Overflow or Wraparound •