CVE-2020-15211Out-of-bounds Read in Tensorflow

Severity
4.8MEDIUMNVD
EPSS
0.3%
top 42.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 25

Description

In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor. However, some operators

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 2.2 | Impact: 2.5

Affected Packages4 packages

NVDgoogle/tensorflow2.0.02.0.3+4
CVEListV5tensorflow/tensorflow< 1.15.4+4
PyPIintel/optimization_for_tensorflow2.0.02.0.3+10
NVDopensuse/leap15.2

Patches

🔴Vulnerability Details

4
CVEList
Out of bounds access in tensorflow-lite2020-09-25
OSV
Out of bounds access in tensorflow-lite2020-09-25
GHSA
Out of bounds access in tensorflow-lite2020-09-25
OSV
CVE-2020-15211: In TensorFlow Lite before versions 12020-09-25

📋Vendor Advisories

1
Debian
CVE-2020-15211: tensorflow - In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved ...2020
CVE-2020-15211 — Out-of-bounds Read in Tensorflow | cvebase