CVE-2020-15199Improper Input Validation in Intel Optimization FOR Tensorflow

Severity
5.9MEDIUMNVD
EPSS
0.2%
top 53.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 25

Description

In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure. Since `BatchedMap` is equivalent to a vector, it needs to have at least one element to not be `nullptr`. If user passes a `splits` tensor that is empty or has exactly one element, we get a

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

PyPIintel/optimization_for_tensorflow2.3.02.3.1+2
CVEListV5tensorflow/tensorflow= 2.3.0

Patches

🔴Vulnerability Details

4
OSV
Denial of Service in Tensorflow2020-09-25
OSV
CVE-2020-15199: In Tensorflow before version 22020-09-25
GHSA
Denial of Service in Tensorflow2020-09-25
CVEList
Denial of Service in Tensorflow2020-09-25

📋Vendor Advisories

1
Debian
CVE-2020-15199: tensorflow - In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not valid...2020
CVE-2020-15199 — Improper Input Validation in Intel | cvebase