Lucene search

K
TensorflowTensorflow

34 matches found

CVE
CVE
added 2020/09/25 7:15 p.m.167 views

CVE-2020-15209

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a nullptr buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. ...

5.9CVSS5.8AI score0.00357EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.166 views

CVE-2020-15211

In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices ...

5.8CVSS5.2AI score0.00344EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.163 views

CVE-2020-15202

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the Shard API in TensorFlow expects the last argument to be a function taking two int64 (i.e., long long) arguments. However, there are several places in TensorFlow where a lambda taking int or int32 arguments is being used. In th...

9CVSS8.8AI score0.00502EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.162 views

CVE-2020-15210

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and...

6.5CVSS6.5AI score0.00329EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.161 views

CVE-2020-15207

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses ResolveAxis to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the DC...

9CVSS8.9AI score0.01411EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.160 views

CVE-2020-15203

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the fill argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a printf call is constructed. This may result in segmentatio...

7.5CVSS7.3AI score0.0036EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.157 views

CVE-2020-15205

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the data_splits argument of tf.raw_ops.StringNGrams lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory In the linked code snippet, all the binary strings after ...

9.8CVSS9.1AI score0.00544EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.154 views

CVE-2020-15208

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a DCHECK which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can c...

9.8CVSS8.3AI score0.0033EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.153 views

CVE-2020-15190

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the tf.raw_ops.Switch operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However...

5.3CVSS5.3AI score0.00189EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.153 views

CVE-2020-15204

In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling tf.raw_ops.GetSessionHandle or tf.raw_ops.GetSessionHandleV2 results in a null pointer dereference In linked snippet, in eager mode, ctx->session_state() returns nullptr...

5.3CVSS5.5AI score0.00221EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.152 views

CVE-2020-15191

In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to dlpack.to_dlpack the expected validations will cause variables to bind to nullptr while setting a status variable to the error condition. However, this status argument is not properly checked. Hence, code followi...

5.3CVSS5.4AI score0.00246EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.152 views

CVE-2020-15206

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's SavedModel protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using tensorflow-serving ...

9CVSS7.7AI score0.00472EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.149 views

CVE-2020-15195

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of SparseFillEmptyRowsGrad uses a double indexing pattern. It is possible for reverse_index_map(i) to be an index outside of bounds of grad_values, thus resulting in a heap buffer overflow. The issue is patched ...

8.8CVSS8.5AI score0.00355EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.147 views

CVE-2020-15194

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the SparseFillEmptyRowsGrad implementation has incomplete validation of the shapes of its arguments. Although reverse_index_map_t and grad_values_t are accessed in a similar pattern, only reverse_index_map_t is validated to be of ...

5.3CVSS5.3AI score0.0022EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.146 views

CVE-2020-15192

In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to dlpack.to_dlpack there is a memory leak following an expected validation failure. The issue occurs because the status argument during validation failures is not properly checked. Since each of the above methods can...

4.3CVSS4.5AI score0.00226EPSS
CVE
CVE
added 2020/12/10 11:15 p.m.142 views

CVE-2020-26266

In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initialize the quantized floating point types in Eigen. ...

5.3CVSS5.2AI score0.00055EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.136 views

CVE-2020-15193

In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of dlpack.to_dlpack can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users from passing i...

7.1CVSS6.8AI score0.00215EPSS
CVE
CVE
added 2020/01/28 10:15 p.m.136 views

CVE-2020-5215

In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker c...

7.5CVSS5.8AI score0.0025EPSS
CVE
CVE
added 2020/12/10 11:15 p.m.121 views

CVE-2020-26268

In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the mem...

4.4CVSS4.9AI score0.00043EPSS
CVE
CVE
added 2020/10/21 9:15 p.m.84 views

CVE-2020-15266

In Tensorflow before version 2.4.0, when the boxes argument of tf.image.crop_and_resize has a very large value, the CPU kernel implementation receives it as a C++ nan floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is pa...

7.5CVSS5.2AI score0.00129EPSS
CVE
CVE
added 2020/10/21 9:15 p.m.81 views

CVE-2020-15265

In Tensorflow before version 2.4.0, an attacker can pass an invalid axis value to tf.quantization.quantize_and_dequantize. This results in accessing a dimension outside the rank of the input tensor in the C++ kernel implementation. However, dim_size only does a DCHECK to validate the argument and t...

7.5CVSS6.1AI score0.00239EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.76 views

CVE-2020-15214

In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger a write out bounds / segmentation fault if the segment ids are not sorted. Code assumes that the segment ids are in increasing order, using the last element of the tensor holding them to determine the dimension...

8.1CVSS7.8AI score0.00261EPSS
CVE
CVE
added 2020/12/10 11:15 p.m.76 views

CVE-2020-26267

In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. T...

7.8CVSS5.9AI score0.00044EPSS
CVE
CVE
added 2020/12/10 11:15 p.m.74 views

CVE-2020-26270

In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. Thi...

4.4CVSS3.9AI score0.00043EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.73 views

CVE-2020-15200

In Tensorflow before version 2.3.1, the RaggedCountSparseOutput implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the splits tensor generate a valid partitioning of the values tensor. Thus, the code sets up...

5.9CVSS6AI score0.00276EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.73 views

CVE-2020-15212

In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to segment_ids_data can alter output_index and then write to outside of output_da...

8.6CVSS8.3AI score0.00238EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.69 views

CVE-2020-15198

In Tensorflow before version 2.3.1, the SparseCountSparseOutput implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the indices tensor has the same shape as the values one. The values in these tensors are always accessed i...

5.8CVSS5.3AI score0.00169EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.69 views

CVE-2020-15213

In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger a denial of service by causing an out of memory allocation in the implementation of segment sum. Since code uses the last element of the tensor holding them to determine the dimensionality of output tensor, att...

4.3CVSS4.2AI score0.00217EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.68 views

CVE-2020-15199

In Tensorflow before version 2.3.1, the RaggedCountSparseOutput does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the splits tensor has the minimum required number of elements. Code uses this quantity to initialize a different data str...

5.9CVSS5.8AI score0.00239EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.64 views

CVE-2020-15201

In Tensorflow before version 2.3.1, the RaggedCountSparseOutput implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the splits tensor generate a valid partitioning of the values tensor. Hence, the code is pro...

6.8CVSS5.3AI score0.00195EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.63 views

CVE-2020-15196

In Tensorflow version 2.3.0, the SparseCountSparseOutput and RaggedCountSparseOutput implementations don't validate that the weights tensor has the same shape as the data. The check exists for DenseCountSparseOutput, where both tensors are fully specified. In the sparse and ragged count weights are...

9.9CVSS9.1AI score0.00302EPSS
CVE
CVE
added 2020/09/25 7:15 p.m.63 views

CVE-2020-15197

In Tensorflow before version 2.3.1, the SparseCountSparseOutput implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the indices tensor has rank 2. This tensor must be a matrix because code assumes its elements are accessed...

6.3CVSS6.3AI score0.0022EPSS
CVE
CVE
added 2020/12/10 10:15 p.m.58 views

CVE-2020-26271

In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node...

4.4CVSS3.8AI score0.00037EPSS
CVE
CVE
added 2020/12/10 11:15 p.m.50 views

CVE-2020-26269

In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementat...

7.5CVSS7.4AI score0.00181EPSS