Skip to content

Integer Overflow or Wraparound in Google TensorFlow

Critical severity GitHub Reviewed Published Apr 30, 2019 to the GitHub Advisory Database • Updated Sep 1, 2023

Package

pip tensorflow (pip)

Affected versions

>= 1.0.0, < 1.7.1

Patched versions

1.7.1

Description

Issue Description

Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The type of exploitation is context-dependent. The block size in meta file might contain a large int64 value which causes an integer overflow upon addition. Subsequent code using n as index may cause an out-of-bounds read.

Impact

A maliciously crafted meta checkpoint could be used to cause the TensorFlow process to perform an out of bounds read on in process memory.

References

Published by the National Vulnerability Database Apr 24, 2019
Reviewed Apr 30, 2019
Published to the GitHub Advisory Database Apr 30, 2019
Last updated Sep 1, 2023

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2018-7575

GHSA ID

GHSA-mw6v-crh8-8533

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.