CVE-2020-26267Out-of-bounds Read in Tensorflow

CWE-125Out-of-bounds Read6 documents5 sources
Severity
7.8HIGHNVD
CNA4.4
EPSS
0.0%
top 95.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 10

Description

In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDgoogle/tensorflow2.0.02.0.4+4
CVEListV5tensorflow/tensorflow< 1.15.5+4
PyPIintel/optimization_for_tensorflow2.0.02.0.4+5

Patches

🔴Vulnerability Details

4
CVEList
Lack of validation in data format attributes in TensorFlow2020-12-10
GHSA
Lack of validation in data format attributes in TensorFlow2020-12-10
OSV
CVE-2020-26267: In affected versions of TensorFlow the tf2020-12-10
OSV
Lack of validation in data format attributes in TensorFlow2020-12-10

📋Vendor Advisories

1
Debian
CVE-2020-26267: tensorflow - In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does ...2020
CVE-2020-26267 — Out-of-bounds Read in Tensorflow | cvebase