In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one. The runtime assumes that these buffers are written to before a possible read, hence they are initialized with `nullptr`. However, by changing the buffer index for a tensor and implicitly converting that tensor to be a read-write one, as there is nothing in the model that writes to it, we get a null pointer dereference. The issue is patched in commit 0b5662bc, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html | Mailing List Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8 | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1 | Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm | Exploit Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html | Mailing List Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8 | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1 | Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html - Mailing List, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/commit/0b5662bc2be13a8c8f044d925d87fb6e56247cd8 - Patch, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1 - Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qh32-6jjc-qprm - Exploit, Third Party Advisory |
Information
Published : 2020-09-25 19:15
Updated : 2024-11-21 05:05
NVD link : CVE-2020-15209
Mitre link : CVE-2020-15209
CVE.ORG link : CVE-2020-15209
JSON object : View
Products Affected
- tensorflow
opensuse
- leap
CWE
CWE-476
NULL Pointer Dereference