Page 174 of 5992 results (0.044 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 2

05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. • https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 2

05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. • https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f • CWE-190: Integer Overflow or Wraparound

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 2

05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions if `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. • https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 2

05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and ... • https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

05 Nov 2021 — TensorFlow is an open source platform for machine learning. In affected versions the implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. This is similar to CVE-2021-29584 (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the implementation (both on CPU and GPU) computes the output shape using `AddDim`. However, if the number of elements in the tensor overflows an `int... • https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429 • CWE-190: Integer Overflow or Wraparound

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

28 Oct 2021 — A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. ... Un componente de HarmonyOS presenta una vulnerabilidad de Desbordamiento de Enteros o Wraparound. Unos atacantes locales pueden explotar esta vulnerabilidad para causar una memoria que no es liberada • https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

28 Oct 2021 — A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. ... Un componente de HarmonyOS presenta una vulnerabilidad de Desbordamiento de Enteros o Wraparound. Unos atacantes locales pueden explotar esta vulnerabilidad para causar una escritura excesiva de la memoria • https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 • CWE-190: Integer Overflow or Wraparound

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

28 Oct 2021 — El procesamiento de un archivo de audio malicioso puede resultar en una terminación inesperada de la aplicación o una ejecución de código arbitrario Security Update 2021-007 Catalina addresses code execution, integer overflow, out of bounds read, and out of bounds write vulnerabilities. • https://support.apple.com/en-us/HT212807 •

CVSS: 9.3EPSS: 0%CPEs: 12EXPL: 0

27 Oct 2021 — Una aplicación maliciosa puede ser capaz de ejecutar código arbitrario con privilegios del kernel macOS Monterey 12.0.1 addresses buffer overflow, bypass, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT212869 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 0%CPEs: 12EXPL: 0

27 Oct 2021 — Una aplicación maliciosa puede ser capaz de ejecutar código arbitrario con privilegios del kernel macOS Monterey 12.0.1 addresses buffer overflow, bypass, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities. • https://support.apple.com/en-us/HT212869 •