// For flags

CVE-2020-26269

Heap out of bounds read in filesystem glob matching in TensorFlow

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPaths but are not verified by the PRs introducing it (#40861 and #44310). Thus, we are completely rewriting the implementation to fully specify and validate these. This is patched in version 2.4.0. This issue only impacts master branch and the release candidates for TF version 2.4. The final release of the 2.4 release will be patched.

En las versiones candidatas a lanzamiento de TensorFlow 2.4.0rc*, la implementación general para hacer coincidir las rutas del sistema de archivos con el patrón globbing es vulnerable a un acceso fuera de límites de la matriz que contiene los directorios. Existen múltiples invariantes y condiciones previas que son asumidas por la implementación paralela de GetMatchingPaths pero no son verificadas por los RP que lo presentan (#40861 y #44310). Por lo tanto, estamos reescribiendo completamente la implementación para especificarlos y validarlos completamente. Esto está parcheado en la versión 2.4.0. Este problema solo afecta a la rama maestra y a los candidatas de lanzamiento para TF versión 2.4. La versión final de la versión 2.4 será parcheada.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-01 CVE Reserved
  • 2020-12-10 CVE Published
  • 2023-07-17 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-125: Out-of-bounds Read
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
2.4.0
Search vendor "Google" for product "Tensorflow" and version "2.4.0"
rc0
Affected
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
2.4.0
Search vendor "Google" for product "Tensorflow" and version "2.4.0"
rc1
Affected
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
2.4.0
Search vendor "Google" for product "Tensorflow" and version "2.4.0"
rc2
Affected
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
2.4.0
Search vendor "Google" for product "Tensorflow" and version "2.4.0"
rc3
Affected
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
2.4.0
Search vendor "Google" for product "Tensorflow" and version "2.4.0"
rc4
Affected