Google Tensorflow vulnerabilities
432 known vulnerabilities affecting google/tensorflow.
Total CVEs
432
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL18HIGH234MEDIUM178LOW2
Vulnerabilities
Page 20 of 22
CVE-2021-29542MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29542 [MEDIUM] CWE-131 CVE-2021-29542: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L171-L185) fai
nvd
CVE-2021-29528MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29528 [MEDIUM] CWE-369 CVE-2021-29528: TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a div
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55900e961ed4a23b438392024912154a2c2f5e85/tensorflow/core/kernels/quantized_mul_op.cc#L188-L198) does a division by a quantity tha
nvd
CVE-2021-29615MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29615 [MEDIUM] CWE-674 CVE-2021-29615: TensorFlow is an end-to-end open source platform for machine learning. The implementation of `ParseA
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `ParseAttrValue`(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/framework/attr_value_util.cc#L397-L453) can be tricked into stack overflow due to recursion by giving in a specially crafted input. The fi
nvd
CVE-2021-29565MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29565 [MEDIUM] CWE-476 CVE-2021-29565: TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a nul
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.SparseFillEmptyRows`. This is because of missing validation(https://github.com/tensorflow/tensorflow/blob/fdc82089d206e281c628a93771336bf87863d5e8/tensorflow/core/kernels/sparse_fill_empty_row
nvd
CVE-2021-29543MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29543 [MEDIUM] CWE-617 CVE-2021-29543: TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a den
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.CTCGreedyDecoder`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1615440b17b364b875eb06f43d087381f1460a65/tensorflow/core/kernels/ctc_decoder_ops.cc#L37-L50) has a `CH
nvd
CVE-2021-29575MEDIUMCVSS 5.5≤ 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29575 [MEDIUM] CWE-119 CVE-2021-29575: TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.ReverseSequence` allows for stack overflow and/or `CHECK`-fail based denial of service. The implementation(https://github.com/tensorflow/tensorflow/blob/5b3b071975e01f0d250c928b2a8f901cd53b90a7/tensorflow/core/kernels/reverse_sequence_op.cc#L114-
nvd
CVE-2021-29552MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29552 [MEDIUM] CWE-617 CVE-2021-29552: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denia
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by controlling the values of `num_segments` tensor argument for `UnsortedSegmentJoin`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a2a607db15c7cd01d754d37e5448d72a13491bdb/tensorflow/core/kernels/unsor
nvd
CVE-2021-29611MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29611 [MEDIUM] CWE-665 CVE-2021-29611: TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `Spa
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.cc#L40) has no validation that t
nvd
CVE-2021-29519MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29519 [MEDIUM] CWE-843 CVE-2021-29519: TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw_ops.Sparse
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op
nvd
CVE-2021-29563MEDIUMCVSS 5.5fixed in 2.1.4≥ 2.2.0, < 2.2.3+2 more2021-05-14
CVE-2021-29563 [MEDIUM] CWE-617 CVE-2021-29563: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denia
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from the implementation of `tf.raw_ops.RFFT`. Eigen code operating on an empty matrix can trigger on an assertion and will cause program termination. The fix will be included in TensorFlow 2.5.0. We
nvd
CVE-2020-26267HIGHCVSS 7.8fixed in 1.15.5≥ 2.0.0, < 2.0.4+3 more2020-12-10
CVE-2020-26267 [HIGH] CWE-125 CVE-2020-26267: In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src
In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2,
nvd
CVE-2020-26269HIGHCVSS 7.5v2.4.02020-12-10
CVE-2020-26269 [HIGH] CWE-125 CVE-2020-26269: In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesyste
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPaths but are not verified by the PR
nvd
CVE-2020-26268MEDIUMCVSS 4.4fixed in 1.15.5≥ 2.0.0, < 2.0.4+3 more2020-12-10
CVE-2020-26268 [MEDIUM] CWE-471 CVE-2020-26268: In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a constant tensor
In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the memory area. If the file is too small, TensorFlow prope
nvd
CVE-2020-26266MEDIUMCVSS 5.3fixed in 1.15.5≥ 2.0.0, < 2.0.4+3 more2020-12-10
CVE-2020-26266 [MEDIUM] CWE-908 CVE-2020-26266: In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialize
In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initialize the quantized floating point types in Eigen. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.
nvd
CVE-2020-26271LOWCVSS 3.3fixed in 1.15.5≥ 2.0.0, < 2.0.4+3 more2020-12-10
CVE-2020-26271 [LOW] CWE-125 CVE-2020-26271: In affected versions of TensorFlow under certain cases, loading a saved model can result in accessin
In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the t
nvd
CVE-2020-26270LOWCVSS 3.3fixed in 1.15.5≥ 2.0.0, < 2.0.4+3 more2020-12-10
CVE-2020-26270 [LOW] CWE-20 CVE-2020-26270: In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an in
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.
nvd
CVE-2020-15266HIGHCVSS 7.5fixed in 2.4.02020-10-21
CVE-2020-15266 [HIGH] CWE-119 CVE-2020-15266: In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a ve
In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee080
nvd
CVE-2020-15265HIGHCVSS 7.5fixed in 2.4.02020-10-21
CVE-2020-15265 [HIGH] CWE-125 CVE-2020-15265: In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization
In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`. This results in accessing a dimension outside the rank of the input tensor in the C++ kernel implementation. However, dim_size only does a DCHECK to validate the argument and then uses it to access the corresponding element of
nvd
CVE-2020-15202CRITICALCVSS 9.0fixed in 1.15.4≥ 2.0.0, < 2.0.3+3 more2020-09-25
CVE-2020-15202 [CRITICAL] CWE-197 CVE-2020-15202: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard` API in TensorFlow e
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments. However, there are several places in TensorFlow where a lambda taking `int` or `int32` arguments is being used. In these cases, if the amount of work to be p
nvd
CVE-2020-15205CRITICALCVSS 9.8fixed in 1.15.4≥ 2.0.0, < 2.0.3+3 more2020-09-25
CVE-2020-15205 [CRITICAL] CWE-119 CVE-2020-15205: In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `data_splits` argument of `
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `data_splits` argument of `tf.raw_ops.StringNGrams` lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory In the linked code snippet, all the binary strings after `ee ff` are contents from the memory stack. Si
nvd