omrimend / conda_project

for tests
0 stars 0 forks source link

tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2: 154 vulnerabilities (highest severity is: 9.8) - autoclosed #3

Closed dev-mend-for-github-com[bot] closed 5 months ago

dev-mend-for-github-com[bot] commented 7 months ago
Vulnerable Library - tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

TensorFlow is a machine learning library.

Library home page: https://api.anaconda.org/download/main/tensorflow/2.3.0/linux-64/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/miniconda3/pkgs/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Found in HEAD commit: 0176dbbc4a1232e1926229894b718c7c733b0cff

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (tensorflow version) Remediation Possible**
CVE-2020-15205 Critical 9.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1
CVE-2020-15202 Critical 9.0 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1
CVE-2021-37678 High 8.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2020-15196 High 8.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.3.1
CVE-2020-15195 High 8.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1
CVE-2020-15214 High 8.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.2.1,2.3.1
CVE-2020-15212 High 8.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct v2.2.1,v2.3.1
CVE-2021-37679 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37676 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37671 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37667 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37666 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37665 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37663 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37662 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37659 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37658 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37657 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37656 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37652 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37651 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37648 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37639 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37638 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-29616 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29614 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29612 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29610 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29608 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29607 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29583 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29577 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29576 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29574 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29571 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29568 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29566 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29558 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29546 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29540 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29537 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29536 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29535 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29520 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29514 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29513 High 7.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2020-15206 High 7.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1
CVE-2020-15203 High 7.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1
CVE-2021-37655 High 7.3 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37664 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37654 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37643 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37641 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37635 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-29613 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29570 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29560 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29559 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29553 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29532 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2020-15193 High 7.1 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.2.1, 2.3.1
CVE-2021-37690 Medium 6.6 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-29595 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29582 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29581 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29580 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29579 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29578 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29573 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29572 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29569 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29567 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29564 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29554 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29541 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29531 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29530 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29529 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29527 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29526 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29525 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29524 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29523 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29522 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29521 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29519 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29518 Medium 6.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2020-15197 Medium 6.3 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.3.1
CVE-2020-15266 Medium 5.9 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.4.0
CVE-2020-15265 Medium 5.9 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.4.0
CVE-2020-15200 Medium 5.9 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.3.1
CVE-2020-15199 Medium 5.9 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.3.1
CVE-2021-37692 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.1, 2.6.0, tensorflow-cpu - 2.5.1, 2.6.0, tensorflow-gpu - 2.5.1, 2.6.0
CVE-2021-37691 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37686 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.6.0, tensorflow-cpu - 2.6.0, tensorflow-gpu - 2.6.0
CVE-2021-37684 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37677 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37675 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37674 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37673 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37672 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37670 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37669 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37668 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37661 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37660 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37653 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37649 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37647 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37646 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37645 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.4.3, 2.5.1, 2.6.0
CVE-2021-37644 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37642 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37640 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.1, 2.6.0, tensorflow-cpu - 2.5.1, 2.6.0, tensorflow-gpu - 2.5.1, 2.6.0
CVE-2021-37637 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-37636 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0
CVE-2021-29619 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29618 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29617 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29611 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29584 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29575 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29565 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29563 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29562 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29561 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29557 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29556 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29555 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29552 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29551 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29550 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29549 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29548 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29547 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29545 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29543 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29542 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29539 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29538 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29534 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29533 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2021-29528 Medium 5.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0
CVE-2020-15198 Medium 5.4 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.3.1
CVE-2020-15204 Medium 5.3 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1
CVE-2020-15191 Medium 5.3 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.2.1, 2.3.1
CVE-2020-15190 Medium 5.3 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1
CVE-2020-15201 Medium 4.8 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.3.1
CVE-2020-15192 Medium 4.3 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct 2.2.1, 2.3.1
CVE-2020-15213 Medium 4.0 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct v2.2.1,v2.3.1
CVE-2021-29517 Low 2.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29516 Low 2.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29515 Low 2.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0
CVE-2021-29512 Low 2.5 tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2 Direct tensorflow - 2.5.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

Partial details (5 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.

CVE-2020-15205 ### Vulnerable Library - tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

TensorFlow is a machine learning library.

Library home page: https://api.anaconda.org/download/main/tensorflow/2.3.0/linux-64/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/miniconda3/pkgs/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Dependency Hierarchy: - :x: **tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2** (Vulnerable Library)

Found in HEAD commit: 0176dbbc4a1232e1926229894b718c7c733b0cff

Found in base branch: master

### Vulnerability Details

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `data_splits` argument of `tf.raw_ops.StringNGrams` lacks validation. This allows a user to pass values that can cause heap overflow errors and even leak contents of memory In the linked code snippet, all the binary strings after `ee ff` are contents from the memory stack. Since these can contain return addresses, this data leak can be used to defeat ASLR. The issue is patched in commit 0462de5b544ed4731aa2fb23946ac22c01856b80, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

Publish Date: 2020-09-25

URL: CVE-2020-15205

### CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g7p5-5759-qv46

Release Date: 2020-09-25

Fix Resolution: 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1

CVE-2020-15202 ### Vulnerable Library - tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

TensorFlow is a machine learning library.

Library home page: https://api.anaconda.org/download/main/tensorflow/2.3.0/linux-64/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/miniconda3/pkgs/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Dependency Hierarchy: - :x: **tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2** (Vulnerable Library)

Found in HEAD commit: 0176dbbc4a1232e1926229894b718c7c733b0cff

Found in base branch: master

### Vulnerability Details

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard` API in TensorFlow expects the last argument to be a function taking two `int64` (i.e., `long long`) arguments. However, there are several places in TensorFlow where a lambda taking `int` or `int32` arguments is being used. In these cases, if the amount of work to be parallelized is large enough, integer truncation occurs. Depending on how the two arguments of the lambda are used, this can result in segfaults, read/write outside of heap allocated arrays, stack overflows, or data corruption. The issue is patched in commits 27b417360cbd671ef55915e4bb6bb06af8b8a832 and ca8c013b5e97b1373b3bb1c97ea655e69f31a575, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

Publish Date: 2020-09-25

URL: CVE-2020-15202

### CVSS 3 Score Details (9.0)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6fg-mjxg-hqq4

Release Date: 2020-09-25

Fix Resolution: 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1

CVE-2021-37678 ### Vulnerable Library - tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

TensorFlow is a machine learning library.

Library home page: https://api.anaconda.org/download/main/tensorflow/2.3.0/linux-64/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/miniconda3/pkgs/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Dependency Hierarchy: - :x: **tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2** (Vulnerable Library)

Found in HEAD commit: 0176dbbc4a1232e1926229894b718c7c733b0cff

Found in base branch: master

### Vulnerability Details

TensorFlow is an end-to-end open source platform for machine learning. In affected versions TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input. Given that YAML format support requires a significant amount of work, we have removed it for now. We have patched the issue in GitHub commit 23d6383eb6c14084a8fc3bdf164043b974818012. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Publish Date: 2021-08-12

URL: CVE-2021-37678

### CVSS 3 Score Details (8.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r6jx-9g48-2r5r

Release Date: 2021-08-12

Fix Resolution: tensorflow - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-cpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0, tensorflow-gpu - 2.3.4, 2.4.3, 2.5.1, 2.6.0

CVE-2020-15196 ### Vulnerable Library - tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

TensorFlow is a machine learning library.

Library home page: https://api.anaconda.org/download/main/tensorflow/2.3.0/linux-64/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/miniconda3/pkgs/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Dependency Hierarchy: - :x: **tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2** (Vulnerable Library)

Found in HEAD commit: 0176dbbc4a1232e1926229894b718c7c733b0cff

Found in base branch: master

### Vulnerability Details

In Tensorflow version 2.3.0, the `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified. In the sparse and ragged count weights are still accessed in parallel with the data. But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1.

Publish Date: 2020-09-25

URL: CVE-2020-15196

### CVSS 3 Score Details (8.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph

Release Date: 2020-09-25

Fix Resolution: 2.3.1

CVE-2020-15195 ### Vulnerable Library - tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

TensorFlow is a machine learning library.

Library home page: https://api.anaconda.org/download/main/tensorflow/2.3.0/linux-64/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/miniconda3/pkgs/tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2

Dependency Hierarchy: - :x: **tensorflow-2.3.0-eigen_py38h71ff20e_0.tar.bz2** (Vulnerable Library)

Found in HEAD commit: 0176dbbc4a1232e1926229894b718c7c733b0cff

Found in base branch: master

### Vulnerability Details

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern. It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

Publish Date: 2020-09-25

URL: CVE-2020-15195

### CVSS 3 Score Details (8.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr

Release Date: 2020-09-25

Fix Resolution: 1.15.4, 2.0.3, 2.1.2, 2.2.1, 2.3.1

dev-mend-for-github-com[bot] commented 5 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.