Safety vulnerability ID: 58001
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Tensorflow-rocm versions 2.2.1 and 2.3.1 include a fix for CVE-2020-15193: In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of "dlpack.to_dlpack" can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users from passing in a Python object instead of a tensor. The uninitialized memory address is due to a "reinterpret_cast". Since the "PyObject" is a Python object, not a Tensorflow tensor, the cast to "EagerTensor" fails. The issue was patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v
Latest version: 2.14.0.600
TensorFlow is an open source machine learning framework for everyone.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application