Vulnerability Details : CVE-2020-15190
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `tf.raw_ops.Switch` operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output. Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault The issue is patched in commit da8558533d925694483d2c136a9220d6d49d843c, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
Vulnerability category: Memory CorruptionInput validation
Products affected by CVE-2020-15190
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15190
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15190
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2020-15190
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Primary)
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Primary)
References for CVE-2020-15190
-
https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c
Fix undefined behavior in `tf.raw_ops.Switch` in eager mode. · tensorflow/tensorflow@da85585 · GitHubPatch;Third Party Advisory
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1
Release TensorFlow 2.3.1 · tensorflow/tensorflow · GitHubThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html
[security-announce] openSUSE-SU-2020:1766-1: moderate: Security update fMailing List;Third Party Advisory
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4
Segfault in tf.raw_ops.Switch in eager mode · Advisory · tensorflow/tensorflow · GitHubExploit;Third Party Advisory
Jump to