In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
References
Link | Resource |
---|---|
https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7 | Exploit Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae - Patch, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7 - Exploit, Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.4 |
Information
Published : 2020-12-10 23:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26267
Mitre link : CVE-2020-26267
CVE.ORG link : CVE-2020-26267
JSON object : View
Products Affected
- tensorflow
CWE
CWE-125
Out-of-bounds Read