First published: Fri Aug 11 2023(Updated: )
Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/intel-tensorflow-avx512 | <2.12 | 2.12 |
pip/tensorflow-intel | <2.12 | 2.12 |
pip/intel-tensorflow | <2.12 | 2.12 |
Exinda WAN Optimization Suite | <2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27506 is a vulnerability that involves improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12.
CVE-2023-27506 has a severity rating of 7.8 (high).
CVE-2023-27506 allows an authenticated user to potentially enable escalation of privilege via local access in Intel Optimization for Tensorflow software before version 2.12.
To fix CVE-2023-27506, update Intel Optimization for Tensorflow software to version 2.12 or later.
You can find more information about CVE-2023-27506 in the following references: [Intel Security Advisory](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00840.html), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-27506), [GitHub Advisory](https://github.com/advisories/GHSA-m2f8-v8q4-3m59).