Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-15196

Опубликовано: 25 сент. 2020
Источник: nvd
CVSS3: 8.5
CVSS3: 9.9
CVSS2: 6.5
EPSS Низкий

Описание

In Tensorflow version 2.3.0, the SparseCountSparseOutput and RaggedCountSparseOutput implementations don't validate that the weights tensor has the same shape as the data. The check exists for DenseCountSparseOutput, where both tensors are fully specified. In the sparse and ragged count weights are still accessed in parallel with the data. But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:google:tensorflow:2.3.0:*:*:*:-:*:*:*

EPSS

Процентиль: 53%
0.00302
Низкий

8.5 High

CVSS3

9.9 Critical

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-119
CWE-125

Связанные уязвимости

CVSS3: 8.5
debian
больше 5 лет назад

In Tensorflow version 2.3.0, the `SparseCountSparseOutput` and `Ragged ...

CVSS3: 8.5
github
больше 5 лет назад

Heap buffer overflow in Tensorflow

EPSS

Процентиль: 53%
0.00302
Низкий

8.5 High

CVSS3

9.9 Critical

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-119
CWE-125