Skip to content

Authenticated Local Privilege Escalation vulnerability in Intel Optimization for Tensorflow

Moderate severity GitHub Reviewed Published Aug 11, 2023 to the GitHub Advisory Database • Updated Nov 9, 2023

Package

pip intel-tensorflow (pip)

Affected versions

< 2.12

Patched versions

2.12
pip intel-tensorflow-avx512 (pip)
< 2.12
2.12
pip tensorflow-intel (pip)
< 2.12
2.12

Description

Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12 may allow an authenticated user to potentially enable escalation of privilege via local access.

References

Published by the National Vulnerability Database Aug 11, 2023
Published to the GitHub Advisory Database Aug 11, 2023
Reviewed Sep 1, 2023
Last updated Nov 9, 2023

Severity

Moderate
5.5
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
Low
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L

Weaknesses

CVE ID

CVE-2023-27506

GHSA ID

GHSA-m2f8-v8q4-3m59

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.