Vulnerability Description
TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tensorflow | < 2.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/tensorflow/tensorflow/commit/ee50d1e00f81f62a4517453f721c634bPatch
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47qPatchVendor Advisory
- https://github.com/tensorflow/tensorflow/commit/ee50d1e00f81f62a4517453f721c634bPatch
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47qPatchVendor Advisory
FAQ
What is CVE-2023-25801?
CVE-2023-25801 is a vulnerability with a CVSS score of 8.0 (HIGH). TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements o...
How severe is CVE-2023-25801?
CVE-2023-25801 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-25801?
Check the references section above for vendor advisories and patch information. Affected products include: Google Tensorflow.