CVE-2020-15200Improper Input Validation in Intel Optimization FOR Tensorflow

Severity
5.9MEDIUMNVD
EPSS
0.3%
top 48.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 25

Description

In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Thus, the code sets up conditions to cause a heap buffer overflow. A `BatchedMap` is equivalent to a vector where each element is a hashmap. However, if the first element of `splits_values` is not 0, `batch_idx` will

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

PyPIintel/optimization_for_tensorflow2.3.02.3.1+2
CVEListV5tensorflow/tensorflow= 2.3.0

Patches

🔴Vulnerability Details

4
GHSA
Segfault in Tensorflow2020-09-25
OSV
CVE-2020-15200: In Tensorflow before version 22020-09-25
OSV
Segfault in Tensorflow2020-09-25
CVEList
Segfault in Tensorflow2020-09-25

📋Vendor Advisories

1
Debian
CVE-2020-15200: tensorflow - In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation...2020
CVE-2020-15200 — Improper Input Validation in Intel | cvebase