Debian Tensorflow vulnerabilities

432 known vulnerabilities affecting debian/tensorflow.

Total CVEs
432
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM1LOW430

Vulnerabilities

Page 21 of 22
CVE-2020-15210LOWCVSS 6.52020
CVE-2020-15210 [MEDIUM] CVE-2020-15210: tensorflow - In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a T... In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2
debian
CVE-2020-15209LOWCVSS 5.92020
CVE-2020-15209 [MEDIUM] CVE-2020-15209: tensorflow - In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a craf... In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a
debian
CVE-2020-15265LOWCVSS 5.92020
CVE-2020-15265 [MEDIUM] CVE-2020-15265: tensorflow - In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value... In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`. This results in accessing a dimension outside the rank of the input tensor in the C++ kernel implementation. However, dim_size only does a DCHECK to validate the argument and then uses it to access the corresponding element of an array.
debian
CVE-2020-15199LOWCVSS 5.92020
CVE-2020-15199 [MEDIUM] CVE-2020-15199: tensorflow - In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not valid... In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure. Since `BatchedMap` is equivalent to a vector, it nee
debian
CVE-2020-26270LOWCVSS 4.42020
CVE-2020-26270 [MEDIUM] CVE-2020-26270: tensorflow - In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU ... In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2
debian
CVE-2020-15207LOWCVSS 8.72020
CVE-2020-15207 [HIGH] CVE-2020-15207: tensorflow - In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mim... In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not trigger, then code execution moves ahead with a
debian
CVE-2020-15191LOWCVSS 5.32020
CVE-2020-15191 [MEDIUM] CVE-2020-15191: tensorflow - In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argum... In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked. Hence, code following these methods will bind references to null pointers.
debian
CVE-2020-15193LOWCVSS 7.12020
CVE-2020-15193 [HIGH] CVE-2020-15193: tensorflow - In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of `dlpack.to_... In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users from passing in a Python object instead of a tensor. The uninitialized memory
debian
CVE-2020-15212LOWCVSS 8.12020
CVE-2020-15212 [HIGH] CVE-2020-15212: tensorflow - In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can... In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `output_data` buffer. This might result in a segmentation fault but it
debian
CVE-2020-5215LOWCVSS 5.02020
CVE-2020-5215 [MEDIUM] CVE-2020-5215: tensorflow - In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf... In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string instead of a tf.float
debian
CVE-2020-26267LOWCVSS 4.42020
CVE-2020-26267 [MEDIUM] CVE-2020-26267: tensorflow - In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does ... In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and
debian
CVE-2020-15203LOWCVSS 7.52020
CVE-2020-15203 [HIGH] CVE-2020-15203: tensorflow - In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controll... In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e682666
debian
CVE-2020-15214LOWCVSS 8.12020
CVE-2020-15214 [HIGH] CVE-2020-15214: tensorflow - In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can... In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger a write out bounds / segmentation fault if the segment ids are not sorted. Code assumes that the segment ids are in increasing order, using the last element of the tensor holding them to determine the dimensionality of output tensor. This results in allocating insufficient me
debian
CVE-2020-15201LOWCVSS 4.82020
CVE-2020-15201 [MEDIUM] CVE-2020-15201: tensorflow - In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation... In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, the code is prone to heap buffer overflow. If `split_values` does not end
debian
CVE-2020-15211LOWCVSS 4.82020
CVE-2020-15211 [MEDIUM] CVE-2020-15211: tensorflow - In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved ... In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned
debian
CVE-2020-15206LOWCVSS 9.02020
CVE-2020-15206 [CRITICAL] CVE-2020-15206: tensorflow - In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing th... In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were a
debian
CVE-2020-15198LOWCVSS 5.42020
CVE-2020-15198 [MEDIUM] CVE-2020-15198: tensorflow - In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation... In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel. Thus, a shape mismatch can result in accesses
debian
CVE-2020-15197LOWCVSS 6.32020
CVE-2020-15197 [MEDIUM] CVE-2020-15197: tensorflow - In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation... In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed as elements of a matrix. However, malicious users can pass
debian
CVE-2020-26269LOWCVSS 7.52020
CVE-2020-26269 [HIGH] CVE-2020-26269: tensorflow - In TensorFlow release candidate versions 2.4.0rc*, the general implementation fo... In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPaths but are not verified by the PRs introducin
debian
CVE-2020-15202LOWCVSS 9.02020
CVE-2020-15202 [CRITICAL] CVE-2020-15202: tensorflow - In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard`... In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments. However, there are several places in TensorFlow where a lambda taking `int` or `int32` arguments is being used. In these cases, if the amount of work to be parallelized
debian