Resource management error in TensorFlow - CVE-2020-26268

 

Resource management error in TensorFlow - CVE-2020-26268

Published: December 11, 2020 / Updated: January 7, 2021


Vulnerability identifier: #VU49327
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-26268
CWE-ID: CWE-399
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
TensorFlow
Software vendor:
TensorFlow

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the application. The tf.raw_ops.ImmutableConst operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the memory area. If the file is too small, TensorFlow properly returns an error as the memory area has fewer bytes than what is needed for the tensor it creates. However, as soon as there are enough bytes, the above snippet causes a segmentation fault.


Remediation

Install updates from vendor's website.

External links