CVE-2020-15201Improper Input Validation in Intel Optimization FOR Tensorflow

Severity
4.8MEDIUMNVD
EPSS
0.2%
top 58.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 25

Description

In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, the code is prone to heap buffer overflow. If `split_values` does not end with a value at least `num_values` then the `while` loop condition will trigger a read outside of the bounds of `split_values` once `bat

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 2.2 | Impact: 2.5

Affected Packages3 packages

PyPIintel/optimization_for_tensorflow2.3.02.3.1+2
CVEListV5tensorflow/tensorflow= 2.3.0

Patches

🔴Vulnerability Details

4
CVEList
Heap buffer overflow in Tensorflow2020-09-25
OSV
CVE-2020-15201: In Tensorflow before version 22020-09-25
GHSA
Heap buffer overflow in Tensorflow2020-09-25
OSV
Heap buffer overflow in Tensorflow2020-09-25

📋Vendor Advisories

1
Debian
CVE-2020-15201: tensorflow - In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` implementation...2020
CVE-2020-15201 — Improper Input Validation in Intel | cvebase