CVE-2020-15191
25.09.2020, 19:15
In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked. Hence, code following these methods will bind references to null pointers. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.Enginsight
Vendor | Product | Version |
---|---|---|
tensorflow | 2.2.0 | |
tensorflow | 2.3.0 | |
opensuse | leap | 15.2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-252 - Unchecked Return ValueThe software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
References