CVE-2020-15194

MEDIUM

Tensorflow <2.3.1 - DoS

Title source: llm
STIX 2.1

Description

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmptyRowsGrad` implementation has incomplete validation of the shapes of its arguments. Although `reverse_index_map_t` and `grad_values_t` are accessed in a similar pattern, only `reverse_index_map_t` is validated to be of proper shape. Hence, malicious users can pass a bad `grad_values_t` to trigger an assertion failure in `vec`, causing denial of service in serving installations. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1."

References (4)

Core 4
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1
Exploit, Patch, Third Party Advisory x_refsource_confirm
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9mqp-7v2h-2382
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html

Scores

CVSS v3 5.3
EPSS 0.0022
EPSS Percentile 44.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-617 CWE-20
Status published
Products (5)
google/tensorflow < 1.15.4
opensuse/leap 15.2
pypi/tensorflow 0 - 1.15.4PyPI
pypi/tensorflow-cpu 0 - 1.15.4PyPI
pypi/tensorflow-gpu 0 - 1.15.4PyPI
Published Sep 25, 2020
Tracked Since Feb 18, 2026