Google Tensorflow vulnerabilities
432 known vulnerabilities affecting google/tensorflow.
Total CVEs
432
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL18HIGH234MEDIUM178LOW2
Vulnerabilities
Page 12 of 22
CVE-2021-41197MEDIUMCVSS 5.5fixed in 2.4.4≥ 2.5.0, < 2.5.2+1 more2021-11-05
CVE-2021-41197 [MEDIUM] CVE-2021-41197: TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows t
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the m
nvd
CVE-2021-41204MEDIUMCVSS 5.5fixed in 2.4.4≥ 2.5.0, < 2.5.2+1 more2021-11-05
CVE-2021-41204 [MEDIUM] CWE-824 CVE-2021-41204: TensorFlow is an open source platform for machine learning. In affected versions during TensorFlow's
TensorFlow is an open source platform for machine learning. In affected versions during TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on Ten
nvd
CVE-2021-41196MEDIUMCVSS 5.5fixed in 2.4.4≥ 2.5.0, < 2.5.2+1 more2021-11-05
CVE-2021-41196 [MEDIUM] CWE-191 CVE-2021-41196: TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling l
TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will
nvd
CVE-2021-37690MEDIUMCVSS 6.6≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-13
CVE-2021-37690 [MEDIUM] CWE-416 CVE-2021-37690: TensorFlow is an end-to-end open source platform for machine learning. In affected versions when run
TensorFlow is an end-to-end open source platform for machine learning. In affected versions when running shape functions, some functions (such as `MutableHashTableShape`) produce extra output information in the form of a `ShapeAndType` struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately;
nvd
CVE-2021-37671HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37671 [HIGH] CWE-824 CVE-2021-37671: TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attac
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.Map*` and `tf.raw_ops.OrderedMap*` operations. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow
nvd
CVE-2021-37652HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37652 [HIGH] CWE-416 CVE-2021-37652: TensorFlow is an end-to-end open source platform for machine learning. In affected versions the impl
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.BoostedTreesCreateEnsemble` can result in a use after free error if an attacker supplies specially crafted arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/
nvd
CVE-2021-37656HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37656 [HIGH] CWE-824 CVE-2021-37656: TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attac
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/ragged_ten
nvd
CVE-2021-37682HIGHCVSS 7.1≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37682 [HIGH] CWE-908 CVE-2021-37682: TensorFlow is an end-to-end open source platform for machine learning. In affected versions all TFLi
TensorFlow is an end-to-end open source platform for machine learning. In affected versions all TFLite operations that use quantization can be made to use unitialized values. [For example](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/depthwise_conv.cc#L198-L200). The issue stems from th
nvd
CVE-2021-37648HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37648 [HIGH] CWE-476 CVE-2021-37648: TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/sa
nvd
CVE-2021-37651HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37651 [HIGH] CWE-125 CVE-2021-37651: TensorFlow is an end-to-end open source platform for machine learning. In affected versions the impl
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core
nvd
CVE-2021-37639HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37639 [HIGH] CWE-476 CVE-2021-37639: TensorFlow is an end-to-end open source platform for machine learning. When restoring tensors via ra
TensorFlow is an end-to-end open source platform for machine learning. When restoring tensors via raw APIs, if the tensor name is not provided, TensorFlow can be tricked into dereferencing a null pointer. Alternatively, attackers can read memory outside the bounds of heap allocated data by providing some tensor names but not enough for a successful re
nvd
CVE-2021-37635HIGHCVSS 7.1≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37635 [HIGH] CWE-125 CVE-2021-37635: TensorFlow is an end-to-end open source platform for machine learning. In affected versions the impl
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sp
nvd
CVE-2021-37643HIGHCVSS 7.1≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37643 [HIGH] CWE-476 CVE-2021-37643: TensorFlow is an end-to-end open source platform for machine learning. If a user does not provide a
TensorFlow is an end-to-end open source platform for machine learning. If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first. The [implementation](https://github.com/tensorflow/tensorflow/b
nvd
CVE-2021-37638HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37638 [HIGH] CWE-476 CVE-2021-37638: TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kerne
nvd
CVE-2021-37679HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37679 [HIGH] CWE-125 CVE-2021-37679: TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is po
TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills output buffer with uninitialized co
nvd
CVE-2021-37650HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37650 [HIGH] CWE-120 CVE-2021-37650: TensorFlow is an end-to-end open source platform for machine learning. In affected versions the impl
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1
nvd
CVE-2021-37655HIGHCVSS 7.3≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37655 [HIGH] CWE-125 CVE-2021-37655: TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attac
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a read from outside of bounds of heap allocated data by sending invalid arguments to `tf.raw_ops.ResourceScatterUpdate`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorfl
nvd
CVE-2021-37681HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37681 [HIGH] CWE-476 CVE-2021-37681: TensorFlow is an end-to-end open source platform for machine learning. In affected versions the impl
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of SVDF in TFLite is [vulnerable to a null pointer error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/svdf.cc#L300-L313). The [`GetVariableInput` function](https://github.com/
nvd
CVE-2021-37658HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37658 [HIGH] CWE-824 CVE-2021-37658: TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attac
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/
nvd
CVE-2021-37667HIGHCVSS 7.8≥ 2.3.0, < 2.3.4≥ 2.4.0, < 2.4.3+2 more2021-08-12
CVE-2021-37667 [HIGH] CWE-824 CVE-2021-37667: TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attac
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.UnicodeEncode`. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unicode_ops.cc#L5
nvd