CVE-2019-16778 – tensorflow
Package
Manager: pip
Name: tensorflow
Vulnerable Version: >=0 <1.15.0
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00336 pctl0.5581
Details
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow ### Impact A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed. ### Patches Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0. ### For more information Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
Metadata
Created: 2019-12-16T20:17:10Z
Modified: 2024-10-28T14:44:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/12/GHSA-844w-j86r-4x2j/GHSA-844w-j86r-4x2j.json
CWE IDs: ["CWE-122", "CWE-681"]
Alternative ID: GHSA-844w-j86r-4x2j
Finding: F113
Auto approve: 1