Implementation of tf.math.segment_* operations may lead to denial of service due to CHECK-fail related abort when a large segment id is used
Reporter | Title | Published | Views | Family All 37 |
---|---|---|---|---|
![]() | BIT-tensorflow-2021-41195 | 6 Mar 202411:16 | – | osv |
![]() | PYSEC-2021-846 | 5 Nov 202120:15 | – | osv |
![]() | CVE-2021-41195 | 5 Nov 202120:15 | – | osv |
![]() | PYSEC-2021-844 | 5 Nov 202120:15 | – | osv |
![]() | PYSEC-2021-842 | 5 Nov 202120:15 | – | osv |
![]() | Crash in `tf.math.segment_*` operations | 10 Nov 202119:36 | – | osv |
![]() | PYSEC-2021-710 | 14 May 202120:15 | – | osv |
![]() | PYSEC-2021-221 | 14 May 202120:15 | – | osv |
![]() | CHECK-fail due to integer overflow | 21 May 202114:26 | – | osv |
![]() | CVE-2021-29584 | 14 May 202120:15 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo