Description
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPaths but are not verified by the PRs introducing it (#40861 and #44310). Thus, we are completely rewriting the implementation to fully specify and validate these. This is patched in version 2.4.0. This issue only impacts master branch and the release candidates for TF version 2.4. The final release of the 2.4 release will be patched.
References (2)
Core 2
Core References
Exploit, Patch, Third Party Advisory x_refsource_confirm
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9jjw-hf72-3mxw
Patch, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c
Scores
CVSS v3
7.5
EPSS
0.0014
EPSS Percentile
33.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (4)
google/tensorflow
2.4.0 rc0 (5 CPE variants)
pypi/tensorflow
2.4.0rc0 - 2.4.0PyPI
pypi/tensorflow-cpu
2.4.0rc0 - 2.4.0PyPI
pypi/tensorflow-gpu
2.4.0rc0 - 2.4.0PyPI
Published
Dec 10, 2020
Tracked Since
Feb 18, 2026