CVE-2020-15192

MEDIUM

Tensorflow <2.2.1, 2.3.1 - Memory Corruption

Title source: llm
STIX 2.1

Description

In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure. The issue occurs because the `status` argument during validation failures is not properly checked. Since each of the above methods can return an error status, the `status` value must be checked before continuing. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.

References (4)

Core 4
Core References
Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html

Scores

CVSS v3 4.3
EPSS 0.0023
EPSS Percentile 45.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-20
Status published
Products (6)
google/tensorflow 2.2.0
google/tensorflow 2.3.0
opensuse/leap 15.2
pypi/tensorflow 2.2.0 - 2.2.1PyPI
pypi/tensorflow-cpu 2.2.0 - 2.2.1PyPI
pypi/tensorflow-gpu 2.2.0 - 2.2.1PyPI
Published Sep 25, 2020
Tracked Since Feb 18, 2026