Lucene search

K
cveGitHub_MCVE-2020-26269
HistoryDec 10, 2020 - 11:15 p.m.

CVE-2020-26269

2020-12-1023:15:12
CWE-125
GitHub_M
web.nvd.nist.gov
29
tensorflow
2.4.0rc*
vulnerability
filesystem
path matching
access out of bounds
array
security patch

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

39.7%

In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPaths but are not verified by the PRs introducing it (#40861 and #44310). Thus, we are completely rewriting the implementation to fully specify and validate these. This is patched in version 2.4.0. This issue only impacts master branch and the release candidates for TF version 2.4. The final release of the 2.4 release will be patched.

Affected configurations

Nvd
Node
googletensorflowMatch2.4.0rc0
OR
googletensorflowMatch2.4.0rc1
OR
googletensorflowMatch2.4.0rc2
OR
googletensorflowMatch2.4.0rc3
OR
googletensorflowMatch2.4.0rc4
VendorProductVersionCPE
googletensorflow2.4.0cpe:2.3:a:google:tensorflow:2.4.0:rc0:*:*:*:*:*:*
googletensorflow2.4.0cpe:2.3:a:google:tensorflow:2.4.0:rc1:*:*:*:*:*:*
googletensorflow2.4.0cpe:2.3:a:google:tensorflow:2.4.0:rc2:*:*:*:*:*:*
googletensorflow2.4.0cpe:2.3:a:google:tensorflow:2.4.0:rc3:*:*:*:*:*:*
googletensorflow2.4.0cpe:2.3:a:google:tensorflow:2.4.0:rc4:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "tensorflow",
    "vendor": "tensorflow",
    "versions": [
      {
        "status": "affected",
        "version": ".4.0rc*"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

39.7%