Lucene search

K
cveGitHub_MCVE-2020-15192
HistorySep 25, 2020 - 7:15 p.m.

CVE-2020-15192

2020-09-2519:15:14
CWE-20
GitHub_M
web.nvd.nist.gov
132
cve-2020-15192
tensorflow
dlpack
memory leak
validation failure
security vulnerability

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

AI Score

4.4

Confidence

High

EPSS

0.002

Percentile

57.8%

In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to dlpack.to_dlpack there is a memory leak following an expected validation failure. The issue occurs because the status argument during validation failures is not properly checked. Since each of the above methods can return an error status, the status value must be checked before continuing. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.

Affected configurations

Nvd
Vulners
Node
googletensorflowMatch2.2.0-
OR
googletensorflowMatch2.3.0-
Node
opensuseleapMatch15.2
VendorProductVersionCPE
googletensorflow2.2.0cpe:2.3:a:google:tensorflow:2.2.0:*:*:*:-:*:*:*
googletensorflow2.3.0cpe:2.3:a:google:tensorflow:2.3.0:*:*:*:-:*:*:*
opensuseleap15.2cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "tensorflow",
    "vendor": "tensorflow",
    "versions": [
      {
        "status": "affected",
        "version": "= 2.2.0"
      },
      {
        "status": "affected",
        "version": "= 2.3.0"
      }
    ]
  }
]

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

AI Score

4.4

Confidence

High

EPSS

0.002

Percentile

57.8%