First published: Fri Sep 25 2020(Updated: )
### Impact When determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442 Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors. ### Patches We have patched the issue in 8ee24e7949a20 and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/tensorflow-gpu | =2.3.0 | 2.3.1 |
pip/tensorflow-gpu | =2.2.0 | 2.2.1 |
pip/tensorflow-gpu | >=2.1.0<2.1.2 | 2.1.2 |
pip/tensorflow-gpu | >=2.0.0<2.0.3 | 2.0.3 |
pip/tensorflow-gpu | <1.15.4 | 1.15.4 |
pip/tensorflow-cpu | =2.3.0 | 2.3.1 |
pip/tensorflow-cpu | =2.2.0 | 2.2.1 |
pip/tensorflow-cpu | >=2.1.0<2.1.2 | 2.1.2 |
pip/tensorflow-cpu | >=2.0.0<2.0.3 | 2.0.3 |
pip/tensorflow-cpu | <1.15.4 | 1.15.4 |
pip/tensorflow | =2.3.0 | 2.3.1 |
pip/tensorflow | =2.2.0 | 2.2.1 |
pip/tensorflow | >=2.1.0<2.1.2 | 2.1.2 |
pip/tensorflow | >=2.0.0<2.0.3 | 2.0.3 |
pip/tensorflow | <1.15.4 | 1.15.4 |
TensorFlow Keras | <1.15.4 | |
TensorFlow Keras | >=2.0.0<2.0.3 | |
TensorFlow Keras | >=2.1.0<2.1.2 | |
TensorFlow Keras | >=2.2.0<2.2.1 | |
TensorFlow Keras | >=2.3.0<2.3.1 | |
SUSE Linux | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15208 is classified as a high-severity vulnerability due to its potential impact on the proper functioning of TensorFlow operations.
To fix CVE-2020-15208, upgrade TensorFlow to version 2.3.1 or higher.
CVE-2020-15208 affects TensorFlow versions 2.3.0, 2.2.0, 2.1.0, 2.0.0, and earlier versions up to 1.15.4.
Yes, TensorFlow Lite is impacted by CVE-2020-15208 as it relates to tensor operations.
The vulnerability in CVE-2020-15208 specifically affects the internal types handling of common dimension sizes in TensorFlow.