CVE-2020-15194
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments. Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1."
Published
2020-09-25T19:15:14.683
Last Modified
2024-11-21T05:05:03.193
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 5.3 (MEDIUM)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
2.9
Weaknesses
-
Type: Secondary
CWE-20
CWE-617
-
Type: Primary
CWE-617
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html
Mailing List, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54
Patch, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1
Release Notes, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382
Exploit, Patch, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1
Release Notes, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382
Exploit, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)