CVE-2020-15209

MEDIUM

TensorFlow-Lite <2.3.1 - Code Injection

Title source: llm
STIX 2.1

Description

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`. However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. The issue is patched in commit 0b5662bc, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

References (4)

Core 4
Core References
Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html

Scores

CVSS v3 5.9
EPSS 0.0036
EPSS Percentile 57.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-476
Status published
Products (5)
google/tensorflow < 1.15.4
opensuse/leap 15.2
pypi/tensorflow 0 - 1.15.4PyPI
pypi/tensorflow-cpu 0 - 1.15.4PyPI
pypi/tensorflow-gpu 0 - 1.15.4PyPI
Published Sep 25, 2020
Tracked Since Feb 18, 2026