Upstream information

CVE-2020-15190 at MITRE

Description

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `tf.raw_ops.Switch` operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output. Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault The issue is patched in commit da8558533d925694483d2c136a9220d6d49d843c, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 5.3
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact Low
CVSSv3 Version 3.1
No SUSE Bugzilla entries cross referenced.

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 15.2
  • libtensorflow2 >= 2.1.2-lp152.7.3.1
  • libtensorflow2-gnu-hpc >= 2.1.2-lp152.7.3.1
  • libtensorflow2-gnu-openmpi2-hpc >= 2.1.2-lp152.7.3.1
  • libtensorflow_cc2 >= 2.1.2-lp152.7.3.1
  • libtensorflow_cc2-gnu-hpc >= 2.1.2-lp152.7.3.1
  • libtensorflow_cc2-gnu-openmpi2-hpc >= 2.1.2-lp152.7.3.1
  • libtensorflow_framework2 >= 2.1.2-lp152.7.3.1
  • libtensorflow_framework2-gnu-hpc >= 2.1.2-lp152.7.3.1
  • libtensorflow_framework2-gnu-openmpi2-hpc >= 2.1.2-lp152.7.3.1
  • tensorflow2 >= 2.1.2-lp152.7.3.1
  • tensorflow2-devel >= 2.1.2-lp152.7.3.1
  • tensorflow2-doc >= 2.1.2-lp152.7.3.1
  • tensorflow2-gnu-hpc >= 2.1.2-lp152.7.3.1
  • tensorflow2-gnu-openmpi2-hpc >= 2.1.2-lp152.7.3.1
  • tensorflow2-lite >= 2.1.2-lp152.7.3.1
  • tensorflow2-lite-devel >= 2.1.2-lp152.7.3.1
  • tensorflow2_2_1_2-gnu-hpc >= 2.1.2-lp152.7.3.1
  • tensorflow2_2_1_2-gnu-hpc-devel >= 2.1.2-lp152.7.3.1
  • tensorflow2_2_1_2-gnu-hpc-doc >= 2.1.2-lp152.7.3.1
  • tensorflow2_2_1_2-gnu-openmpi2-hpc >= 2.1.2-lp152.7.3.1
  • tensorflow2_2_1_2-gnu-openmpi2-hpc-devel >= 2.1.2-lp152.7.3.1
  • tensorflow2_2_1_2-gnu-openmpi2-hpc-doc >= 2.1.2-lp152.7.3.1
Patchnames:
openSUSE-2020-1766
openSUSE Tumbleweed
  • tensorflow-lite >= 2.9.1-1.1
  • tensorflow-lite-devel >= 2.9.1-1.1
Patchnames:
openSUSE Tumbleweed GA tensorflow-lite-2.9.1-1.1


SUSE Timeline for this CVE

CVE page created: Sat Sep 26 03:24:37 2020
CVE page last modified: Thu Dec 7 13:28:23 2023