
CVE-2021-41197 – Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes
https://notcve.org/view.php?id=CVE-2021-41197
05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. • https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-41198 – Overflow/crash in `tf.tile` when tiling tensor is large
https://notcve.org/view.php?id=CVE-2021-41198
05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. • https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f • CWE-190: Integer Overflow or Wraparound •

CVE-2021-41199 – Overflow/crash in `tf.image.resize` when size is large
https://notcve.org/view.php?id=CVE-2021-41199
05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions if `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. • https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-41196 – Crash in `max_pool3d` when size argument is 0 or negative
https://notcve.org/view.php?id=CVE-2021-41196
05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and ... • https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2021-41195 – Crash in `tf.math.segment_*` operations
https://notcve.org/view.php?id=CVE-2021-41195
05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions the implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. This is similar to CVE-2021-29584 (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the implementation (both on CPU and GPU) computes the output shape using `AddDim`. However, if the number of elements in the tensor overflows an `int... • https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-22455
https://notcve.org/view.php?id=CVE-2021-22455
28 Oct 2021 — A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. ... Un componente de HarmonyOS presenta una vulnerabilidad de Desbordamiento de Enteros o Wraparound. Unos atacantes locales pueden explotar esta vulnerabilidad para causar una memoria que no es liberada • https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-22451
https://notcve.org/view.php?id=CVE-2021-22451
28 Oct 2021 — A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. ... Un componente de HarmonyOS presenta una vulnerabilidad de Desbordamiento de Enteros o Wraparound. Unos atacantes locales pueden explotar esta vulnerabilidad para causar una escritura excesiva de la memoria • https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-30834 – Apple Security Advisory 2021-10-26-11
https://notcve.org/view.php?id=CVE-2021-30834
28 Oct 2021 — El procesamiento de un archivo de audio malicioso puede resultar en una terminación inesperada de la aplicación o una ejecución de código arbitrario Security Update 2021-007 Catalina addresses code execution, integer overflow, out of bounds read, and out of bounds write vulnerabilities. • https://support.apple.com/en-us/HT212807 •

CVE-2021-30824 – Apple Security Advisory 2021-10-26-4
https://notcve.org/view.php?id=CVE-2021-30824
27 Oct 2021 — Una aplicación maliciosa puede ser capaz de ejecutar código arbitrario con privilegios del kernel macOS Monterey 12.0.1 addresses buffer overflow, bypass, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT212869 • CWE-787: Out-of-bounds Write •

CVE-2021-30821 – Apple Security Advisory 2021-10-26-4
https://notcve.org/view.php?id=CVE-2021-30821
27 Oct 2021 — Una aplicación maliciosa puede ser capaz de ejecutar código arbitrario con privilegios del kernel macOS Monterey 12.0.1 addresses buffer overflow, bypass, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT212869 •