CVE-2020-26269 - log back

CVE-2020-26269 edited at 16 Dec 2020 20:40:55
Type
- Denial of service
+ Information disclosure
CVE-2020-26269 edited at 15 Dec 2020 13:30:56
References
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9jjw-hf72-3mxw
- https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c
+ https://github.com/tensorflow/tensorflow/commit/18d54d15864eaa8b163183786d05c6bd8b47ba28
CVE-2020-26269 edited at 12 Dec 2020 17:26:46
Severity
- High
+ Critical
CVE-2020-26269 edited at 11 Dec 2020 14:10:58
Severity
- Unknown
+ High
Remote
- Unknown
+ Local
Type
- Unknown
+ Denial of service
Description
+ In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPaths but are not verified by the PRs introducing it (#40861 and #44310). Thus, we are completely rewriting the implementation to fully specify and validate these. This is patched in version 2.4.0. This issue only impacts master branch and the release candidates for TF version 2.4. The final release of the 2.4 release will be patched.
References
+ https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9jjw-hf72-3mxw
+ https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c
Notes
CVE-2020-26269 created at 11 Dec 2020 14:09:02