First published: Wed Apr 24 2019(Updated: )
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Snappy | =1.1.4 | |
Google TensorFlow | <1.7.1 | |
pip/tensorflow-gpu | >=1.1.0<1.7.1 | 1.7.1 |
pip/tensorflow | >=1.1.0<1.7.1 | 1.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7577 has a medium severity level due to its potential to cause a crash or read from other parts of process memory.
To mitigate CVE-2018-7577, upgrade Google Snappy to version 1.1.4 or higher or TensorFlow to version 1.7.1 or later.
CVE-2018-7577 affects all TensorFlow versions prior to 1.7.1.
Yes, CVE-2018-7577 can potentially lead to unauthorized read access to other parts of process memory, resulting in data leaks.
No, only Google Snappy version 1.1.4 is specifically identified as vulnerable in CVE-2018-7577.