Intel Optimization For Tensorflow vulnerabilities

429 known vulnerabilities affecting intel/optimization_for_tensorflow.

Total CVEs
429
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH121MEDIUM200LOW103

Vulnerabilities

Page 1 of 22
CVE-2023-33976HIGH≥ 0, < 2.12.12024-07-30
CVE-2023-33976 [HIGH] CWE-190 TensorFlow has segfault in array_ops.upper_bound TensorFlow has segfault in array_ops.upper_bound ### Impact `array_ops.upper_bound` causes a segfault when not given a rank 2 tensor. ### Patches We have patched the issue in GitHub commit [915884fdf5df34aaedd00fc6ace33a2cfdefa586](https://github.com/tensorflow/tensorflow/commit/915884fdf5df34aaedd00fc6ace33a2cfdefa586). The fix will be included in TensorFlow 2.13. We will also cherrypick this commit in TensorFlow
ghsaosv
CVE-2023-30767MEDIUMCVSS 6.7fixed in 2.13.0vbefore version 2.13.02024-02-14
CVE-2023-30767 [MEDIUM] CWE-92 CVE-2023-30767: Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
cvelistv5nvd
CVE-2023-27506HIGHCVSS 7.8fixed in 2.122023-08-11
CVE-2023-27506 [HIGH] CWE-92 CVE-2023-27506: Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.1 Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12 may allow an authenticated user to potentially enable escalation of privilege via local access.
nvd
CVE-2023-25661MEDIUM≥ 0, < 2.11.12023-03-27
CVE-2023-25661 [MEDIUM] CWE-20 TensorFlow Denial of Service vulnerability TensorFlow Denial of Service vulnerability ### Impact A malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack. To minimize the bug, we built a simple single-layer TensorFlow model containing a Convolution3DTranspose layer, which works well with expected inputs and can be deployed in real-world systems. However, if we call the model with a malicious input wh
ghsaosv
CVE-2023-25668CRITICAL≥ 0, < 2.11.12023-03-24
CVE-2023-25668 [CRITICAL] CWE-122 TensorFlow has a heap out-of-buffer read vulnerability in the QuantizeAndDequantize operation TensorFlow has a heap out-of-buffer read vulnerability in the QuantizeAndDequantize operation ### Impact Attackers using Tensorflow can exploit the vulnerability. They can access heap memory which is not in the control of user, leading to a crash or RCE. When axis is larger than the dim of input, c->Dim(input,axis) goes out of bound. Same problem occurs in the Quantize
ghsaosv
CVE-2023-25671HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25671 [HIGH] CWE-787 TensorFlow has segmentation fault in tfg-translate TensorFlow has segmentation fault in tfg-translate ### Impact Out-of-bounds access due to mismatched integer type sizes in ValueMap::Manager::GetValueOrCreatePlaceholder. Bug with tfg-translate call to InitMlir. The problem happens with generic functions, as it is already handled for non-generic functions. This is because they, unlike non-generic functions, are using the "old importer". A better long-term solution
ghsaosv
CVE-2023-25801HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25801 [HIGH] CWE-415 TensorFlow has double free in Fractional(Max/Avg)Pool TensorFlow has double free in Fractional(Max/Avg)Pool ### Impact `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. ```python import tensorflow as tf import os import numpy as np from tensorflow.python.ops import nn_ops try: arg_0_tensor = tf.
ghsaosv
CVE-2023-25673HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25673 [HIGH] CWE-697 TensorFlow has Floating Point Exception in TensorListSplit with XLA TensorFlow has Floating Point Exception in TensorListSplit with XLA ### Impact FPE in TensorListSplit with XLA ```python import tensorflow as tf func = tf.raw_ops.TensorListSplit para = {'tensor': [1], 'element_shape': -1, 'lengths': [0]} @tf.function(jit_compile=True) def fuzz_jit(): y = func(**para) return y print(fuzz_jit()) ``` ### Patches We have patched the issue in GitHub commit [728113a
ghsaosv
CVE-2023-27579HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-27579 [HIGH] CWE-697 TensorFlow has Floating Point Exception in TFLite in conv kernel TensorFlow has Floating Point Exception in TFLite in conv kernel ### Impact Constructing a tflite model with a paramater `filter_input_channel` of less than 1 gives a FPE. ### Patches We have patched the issue in GitHub commit [34f8368c535253f5c9cb3a303297743b62442aaa](https://github.com/tensorflow/tensorflow/commit/34f8368c535253f5c9cb3a303297743b62442aaa). The fix will be included in TensorFlow 2
ghsaosv
CVE-2023-25675HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25675 [HIGH] CWE-697 TensorFlow has Segfault in Bincount with XLA TensorFlow has Segfault in Bincount with XLA ### Impact When running with XLA, `tf.raw_ops.Bincount` segfaults when given a parameter `weights` that is neither the same shape as parameter `arr` nor a length-0 tensor. ```python import tensorflow as tf func = tf.raw_ops.Bincount para={'arr': 6, 'size': 804, 'weights': [52, 351]} @tf.function(jit_compile=True) def fuzz_jit(): y = func(**para) return y print(fuzz_jit())
ghsaosv
CVE-2023-25664HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25664 [HIGH] CWE-120 TensorFlow has Heap-buffer-overflow in AvgPoolGrad TensorFlow has Heap-buffer-overflow in AvgPoolGrad ### Impact ```python import os os.environ['TF_ENABLE_ONEDNN_OPTS'] = '0' import tensorflow as tf print(tf.__version__) with tf.device("CPU"): ksize = [1, 40, 128, 1] strides = [1, 128, 128, 30] padding = "SAME" data_format = "NHWC" orig_input_shape = [11, 9, 78, 9] grad = tf.saturate_cast(tf.random.uniform([16, 16, 16, 16], minval=-128, maxval=129, dtype=tf.int64),
ghsaosv
CVE-2023-25666HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25666 [HIGH] CWE-697 TensorFlow has Floating Point Exception in AudioSpectrogram TensorFlow has Floating Point Exception in AudioSpectrogram ### Impact version:2.11.0 //core/ops/audio_ops.cc:70 Status SpectrogramShapeFn(InferenceContext* c) { ShapeHandle input; TF_RETURN_IF_ERROR(c->WithRank(c->input(0), 2, &input)); int32_t window_size; TF_RETURN_IF_ERROR(c->GetAttr("window_size", &window_size)); int32_t stride; TF_RETURN_IF_ERROR(c->GetAttr("stride", &stride)); .....[1] DimensionHa
ghsaosv
CVE-2023-25670HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25670 [HIGH] CWE-476 TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize ### Impact NPE in QuantizedMatMulWithBiasAndDequantize with MKL enable ```python import tensorflow as tf func = tf.raw_ops.QuantizedMatMulWithBiasAndDequantize para={'a': tf.constant(138, dtype=tf.quint8), 'b': tf.constant(4, dtype=tf.qint8), 'bias': [[31.81644630432129, 47.21876525878906], [109.95201110839844, 152.079
ghsaosv
CVE-2023-25658HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25658 [HIGH] CWE-125 TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad ### Impact Out of bounds read in GRUBlockCellGrad ```python func = tf.raw_ops.GRUBlockCellGrad para = {'x': [[21.1, 156.2], [83.3, 115.4]], 'h_prev': array([[136.5], [136.6]]), 'w_ru': array([[26.7, 0.8], [47.9, 26.1], [26.2, 26.3]]), 'w_c': array([[ 0.4], [31.5], [ 0.6]]), 'b_ru': array([0.1, 0.2 ], dtype=float32), 'b_c': 0x41414141, 'r'
ghsaosv
CVE-2023-25659HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25659 [HIGH] CWE-125 TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch TensorFlow vulnerable to Out-of-Bounds Read in DynamicStitch ### Impact If the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read. ```python import tensorflow as tf func = tf.raw_ops.DynamicStitch para={'indices': [[0xdeadbeef], [405], [519], [758], [1015]], 'data': [[110.27793884277344], [120.29475402832031], [157.2418212890625], [1
ghsaosv
CVE-2023-25662HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25662 [HIGH] CWE-190 TensorFlow vulnerable to integer overflow in EditDistance TensorFlow vulnerable to integer overflow in EditDistance ### Impact TFversion 2.11.0 //tensorflow/core/ops/array_ops.cc:1067 const Tensor* hypothesis_shape_t = c->input_tensor(2); std::vector dims(hypothesis_shape_t->NumElements() - 1); for (int i = 0; i MakeDim(std::max(h_values(i), t_values(i))); } if hypothesis_shape_t is empty, hypothesis_shape_t->NumElements() - 1 will be integer overflow, and the it
ghsaosv
CVE-2023-25663HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25663 [HIGH] CWE-476 TensorFlow has Null Pointer Error in TensorArrayConcatV2 TensorFlow has Null Pointer Error in TensorArrayConcatV2 ### Impact When ctx->step_containter() is a null ptr, the Lookup function will be executed with a null pointer. ```python import tensorflow as tf tf.raw_ops.TensorArrayConcatV2(handle=['a', 'b'], flow_in = 0.1, dtype=tf.int32, element_shape_except0=1) ``` ### Patches We have patched the issue in GitHub commit [239139d2ae6a81ae9ba499ad78b56d9b2931538a](
ghsaosv
CVE-2023-25665HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25665 [HIGH] CWE-476 TensorFlow has Null Pointer Error in SparseSparseMaximum TensorFlow has Null Pointer Error in SparseSparseMaximum ### Impact When `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give an NPE. ```python import tensorflow as tf tf.raw_ops.SparseSparseMaximum( a_indices=[[1]], a_values =[ 0.1 ], a_shape = [2], b_indices=[[]], b_values =[2 ], b_shape = [2], ) ``` ### Patches We have patched the issue in GitHub commit [5e0ecfb42f5f65629fd7a4edd6
ghsaosv
CVE-2023-25669HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25669 [HIGH] CWE-697 TensorFlow has Floating Point Exception in AvgPoolGrad with XLA TensorFlow has Floating Point Exception in AvgPoolGrad with XLA ### Impact If the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give an FPE. ```python import tensorflow as tf import numpy as np @tf.function(jit_compile=True) def test(): y = tf.raw_ops.AvgPoolGrad(orig_input_shape=[1,0,0,0], grad=[[[[0.39117979]]]], ksize=[1,0,0,0], strides=[1,0,0,0], padding="SAME", dat
ghsaosv
CVE-2023-25676HIGH≥ 0, < 2.11.12023-03-24
CVE-2023-25676 [HIGH] CWE-476 TensorFlow has null dereference on ParallelConcat with XLA TensorFlow has null dereference on ParallelConcat with XLA ### Impact When running with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero. ```python import tensorflow as tf func = tf.raw_ops.ParallelConcat para = {'shape': 0, 'values': [1]} @tf.function(jit_compile=True) def test(): y = func(**para) return y test(
ghsaosv
1 / 22Next →