Lucene search

K
githubGitHub Advisory DatabaseGHSA-M648-33QF-V3GP
HistoryDec 10, 2020 - 7:07 p.m.

CHECK-fail in LSTM with zero-length input in TensorFlow

2020-12-1019:07:31
CWE-20
GitHub Advisory Database
github.com
34
lstm
gru
vulnerability
denial of service
tensorflow
security
patch
cuda
github commit
query-of-death
input control
version
security guide

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

EPSS

0

Percentile

12.6%

Impact

Running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend.

This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer.

Patches

We have patched the issue in GitHub commit 14755416e364f17fb1870882fa778c7fec7f16e3 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.

Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Affected configurations

Vulners
Node
tensorflow-gpuRange2.3.02.3.2
OR
tensorflow-gpuRange2.2.02.2.2
OR
tensorflow-gpuRange2.1.02.1.3
OR
tensorflow-gpuRange2.0.02.0.4
OR
tensorflow-gpuRange<1.15.5
OR
tensorflow-cpuRange2.3.02.3.2
OR
tensorflow-cpuRange2.2.02.2.2
OR
tensorflow-cpuRange2.1.02.1.3
OR
tensorflow-cpuRange2.0.02.0.4
OR
tensorflow-cpuRange<1.15.5
OR
tensorflowtensorflowRange2.3.02.3.2
OR
tensorflowtensorflowRange2.2.02.2.2
OR
tensorflowtensorflowRange2.1.02.1.3
OR
tensorflowtensorflowRange2.0.02.0.4
OR
tensorflowtensorflowRange<1.15.5
VendorProductVersionCPE
*tensorflow-gpu*cpe:2.3:a:*:tensorflow-gpu:*:*:*:*:*:*:*:*
*tensorflow-cpu*cpe:2.3:a:*:tensorflow-cpu:*:*:*:*:*:*:*:*
tensorflowtensorflow*cpe:2.3:a:tensorflow:tensorflow:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

EPSS

0

Percentile

12.6%