pysec-2020-271
Vulnerability from pysec
Published
2020-09-25 19:15
Modified
2021-12-09 06:34
Details
In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to dlpack.to_dlpack
the expected validations will cause variables to bind to nullptr
while setting a status
variable to the error condition. However, this status
argument is not properly checked. Hence, code following these methods will bind references to null pointers. This is undefined behavior and reported as an error if compiling with -fsanitize=null
. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "tensorflow-cpu", "purl": "pkg:pypi/tensorflow-cpu" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "22e07fb204386768e5bcbea563641ea11f96ceb8" } ], "repo": "https://github.com/tensorflow/tensorflow", "type": "GIT" }, { "events": [ { "introduced": "0" }, { "fixed": "2.2.1" }, { "introduced": "2.3.0rc0" }, { "fixed": "2.3.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "1.15.0", "2.1.0", "2.1.1", "2.1.2", "2.1.3", "2.1.4", "2.2.0", "2.3.0" ] } ], "aliases": [ "CVE-2020-15191", "GHSA-q8qj-fc9q-cphr" ], "details": "In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked. Hence, code following these methods will bind references to null pointers. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.", "id": "PYSEC-2020-271", "modified": "2021-12-09T06:34:40.816458Z", "published": "2020-09-25T19:15:00Z", "references": [ { "type": "ADVISORY", "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr" }, { "type": "WEB", "url": "https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1" }, { "type": "FIX", "url": "https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.