Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-26267


In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.


Published

2020-12-10T23:15:12.723

Last Modified

2024-11-21T05:19:42.457

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.4 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.1

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-125
  • Type: Primary
    CWE-125

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application google tensorflow < 1.15.5 Yes
Application google tensorflow < 2.0.4 Yes
Application google tensorflow < 2.1.3 Yes
Application google tensorflow < 2.2.2 Yes
Application google tensorflow < 2.3.2 Yes

References