4.3
CVSSv3

CVE-2020-15192

Published: 25/09/2020 Updated: 18/11/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

In Tensorflow prior to 2.2.1 and 2.3.1, if a user passes a list of strings to `dlpack.to_dlpack` there is a memory leak following an expected validation failure. The issue occurs because the `status` argument during validation failures is not properly checked. Since each of the above methods can return an error status, the `status` value must be checked before continuing. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google tensorflow 2.2.0

google tensorflow 2.3.0

opensuse leap 15.2

Github Repositories

Sample Attack Graph Generated by Graphene

graphene-sample-data This repo contains the sample attack graph generated by Graphene Overview The all_layer_samplesjson file contains detailed information the sample attack graph Each entry represents one node (ie, one CVE), including descriptions, scores, conditions, and entities associated with the vulnerability The similarity scores are used to construct edges among n