4.3
CVSSv2

CVE-2020-26267

Published: 10/12/2020 Updated: 17/08/2021
CVSS v2 Base Score: 4.3 | Impact Score: 6.4 | Exploitability Score: 3.1
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:L/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory accesses, read outside of bounds and even crashes. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google tensorflow

Vendor Advisories

In affected versions of TensorFlow the tfraw_opsDataFormatVecPermute API does not validate the src_format and dst_format attributes The code assumes that these two arguments define a permutation of NHWC This can result in uninitialized memory accesses, read outside of bounds and even crashes This is fixed in versions 1155, 204, 213, 22 ...