
CVE-2021-21861 – Gentoo Linux Security Advisory 202408-21
https://notcve.org/view.php?id=CVE-2021-21861
16 Aug 2021 — An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 • CWE-680: Integer Overflow to Buffer Overflow CWE-681: Incorrect Conversion between Numeric Types •

CVE-2021-21860 – Gentoo Linux Security Advisory 202408-21
https://notcve.org/view.php?id=CVE-2021-21860
16 Aug 2021 — An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 • CWE-680: Integer Overflow to Buffer Overflow CWE-681: Incorrect Conversion between Numeric Types •

CVE-2021-21859 – Gentoo Linux Security Advisory 202408-21
https://notcve.org/view.php?id=CVE-2021-21859
16 Aug 2021 — An exploitable integer truncation vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298 • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVE-2021-37646 – Bad alloc in `StringNGrams` caused by integer conversion in TensorFlow
https://notcve.org/view.php?id=CVE-2021-37646
12 Aug 2021 — In affected versions the implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ... Hence, the implicit conversion transforms the negative value to a large integer. • https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5 • CWE-681: Incorrect Conversion between Numeric Types •

CVE-2021-37645 – Integer overflow due to conversion to unsigned in TensorFlow
https://notcve.org/view.php?id=CVE-2021-37645
12 Aug 2021 — In affected versions the implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ... But, the constructor uses an unsigned type for the argument, so the implicit conversion transforms the negative value to a large integer. • https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1 • CWE-681: Incorrect Conversion between Numeric Types •

CVE-2021-1108
https://notcve.org/view.php?id=CVE-2021-1108
11 Aug 2021 — NVIDIA Linux kernel distributions contain a vulnerability in FuSa Capture (VI/ISP), where integer underflow due to lack of input validation may lead to complete denial of service, partial integrity, and serious confidentiality loss for all processes in the system. • https://nvidia.custhelp.com/app/answers/detail/a_id/5216 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2021-34536 – Storage Spaces Controller Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-34536
11 Aug 2021 — The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34536 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-34334 – Denial of service due to integer overflow in loop counter
https://notcve.org/view.php?id=CVE-2021-34334
09 Aug 2021 — Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5. Exiv2 es una utilidad de línea de comandos y una biblioteca C++ para leer, escribir, borrar y modi... • https://github.com/Exiv2/exiv2/pull/1766 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2021-37619 – Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header
https://notcve.org/view.php?id=CVE-2021-37619
09 Aug 2021 — Issues addressed include buffer overflow, denial of service, information leakage, integer overflow, and out of bounds read vulnerabilities. • https://github.com/Exiv2/exiv2/pull/1752 • CWE-125: Out-of-bounds Read •

CVE-2021-37618 – Out-of-bounds read in Exiv2::Jp2Image::printStructure
https://notcve.org/view.php?id=CVE-2021-37618
09 Aug 2021 — Issues addressed include buffer overflow, denial of service, information leakage, integer overflow, and out of bounds read vulnerabilities. • https://github.com/Exiv2/exiv2/pull/1759 • CWE-125: Out-of-bounds Read •