Description
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References (2)
Core 2
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq
Patch, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6
Scores
CVSS v3
8.8
EPSS
0.0018
EPSS Percentile
38.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-787
Status
published
Products (5)
google/tensorflow
2.7.0
google/tensorflow
< 2.5.2
pypi/tensorflow
0 - 2.5.3PyPI
pypi/tensorflow-cpu
0 - 2.5.3PyPI
pypi/tensorflow-gpu
0 - 2.5.3PyPI
Published
Feb 04, 2022
Tracked Since
Feb 18, 2026