Lucene search

K
cveGitHub_MCVE-2020-26266
HistoryDec 10, 2020 - 11:15 p.m.

CVE-2020-26266

2020-12-1023:15:12
CWE-908
GitHub_M
web.nvd.nist.gov
117
tensorflow
cve-2020-26266
security vulnerability
uninitialized values
code execution
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

38.5%

In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initialize the quantized floating point types in Eigen. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.

Affected configurations

Nvd
Vulners
Node
googletensorflowRange<1.15.5
OR
googletensorflowRange2.0.02.0.4
OR
googletensorflowRange2.1.02.1.3
OR
googletensorflowRange2.2.02.2.2
OR
googletensorflowRange2.3.02.3.2
VendorProductVersionCPE
googletensorflow*cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "tensorflow",
    "vendor": "tensorflow",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.15.5"
      },
      {
        "status": "affected",
        "version": ">= 2.0.0, < 2.0.4"
      },
      {
        "status": "affected",
        "version": ">= 2.1.0, < 2.1.3"
      },
      {
        "status": "affected",
        "version": ">= 2.2.0, < 2.2.2"
      },
      {
        "status": "affected",
        "version": ">= 2.3.0, < 2.3.2"
      }
    ]
  }
]

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

38.5%