Google

Tensorflow

432 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Published 10.12.2020 23:15:12
  • Last modified 21.11.2024 05:19:42

In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initial...

Exploit
  • EPSS 0.02%
  • Published 10.12.2020 23:15:12
  • Last modified 21.11.2024 05:19:42

In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. The code assumes that these two arguments define a permutation of NHWC. This can result in uninitialized memory acc...

Exploit
  • EPSS 0.02%
  • Published 10.12.2020 23:15:12
  • Last modified 21.11.2024 05:19:42

In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the P...

Exploit
  • EPSS 0.18%
  • Published 10.12.2020 23:15:12
  • Last modified 21.11.2024 05:19:42

In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and precondit...

  • EPSS 0.02%
  • Published 10.12.2020 23:15:12
  • Last modified 21.11.2024 05:19:42

In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service,...

Exploit
  • EPSS 0.02%
  • Published 10.12.2020 22:15:12
  • Last modified 21.11.2024 05:19:43

In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by...

Exploit
  • EPSS 0.24%
  • Published 21.10.2020 21:15:12
  • Last modified 21.11.2024 05:05:13

In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`. This results in accessing a dimension outside the rank of the input tensor in the C++ kernel implementation. However, dim_s...

Exploit
  • EPSS 0.13%
  • Published 21.10.2020 21:15:12
  • Last modified 21.11.2024 05:05:13

In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior whi...

Exploit
  • EPSS 0.33%
  • Published 25.09.2020 19:15:16
  • Last modified 21.11.2024 05:05:05

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimen...

Exploit
  • EPSS 0.36%
  • Published 25.09.2020 19:15:16
  • Last modified 21.11.2024 05:05:05

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization ...