In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee0808 and TensorFlow 2.4.0 will be released containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
References
| Link | Resource |
|---|---|
| https://github.com/tensorflow/tensorflow/issues/42129 | Exploit Patch Third Party Advisory |
| https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845 | Patch Third Party Advisory |
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc | Patch Third Party Advisory |
| https://github.com/tensorflow/tensorflow/issues/42129 | Exploit Patch Third Party Advisory |
| https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845 | Patch Third Party Advisory |
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:05
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 3.7 |
| References | () https://github.com/tensorflow/tensorflow/issues/42129 - Exploit, Patch, Third Party Advisory | |
| References | () https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845 - Patch, Third Party Advisory | |
| References | () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc - Patch, Third Party Advisory |
Information
Published : 2020-10-21 21:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15266
Mitre link : CVE-2020-15266
CVE.ORG link : CVE-2020-15266
JSON object : View
Products Affected
- tensorflow
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
