Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453", "name": "https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453", "tags": ["Patch", "Third Party Advisory"], "refsource": "MISC"}, {"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2", "name": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2", "tags": ["Exploit", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1", "name": "https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1", "tags": ["Third Party Advisory"], "refsource": "MISC"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html", "name": "openSUSE-SU-2020:1766", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "SUSE"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-787"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2020-15210", "ASSIGNER": "security-advisories@github.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "acInsufInfo": false, "impactScore": 4.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.2, "exploitabilityScore": 2.2}}, "publishedDate": "2020-09-25T19:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:google:tensorflow:*:*:*:*:lite:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "1.15.4"}, {"cpe23Uri": "cpe:2.3:a:google:tensorflow:*:*:*:*:lite:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.0.3", "versionStartIncluding": "2.0.0"}, {"cpe23Uri": "cpe:2.3:a:google:tensorflow:*:*:*:*:lite:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.1.2", "versionStartIncluding": "2.1.0"}, {"cpe23Uri": "cpe:2.3:a:google:tensorflow:*:*:*:*:lite:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.2.1", "versionStartIncluding": "2.2.0"}, {"cpe23Uri": "cpe:2.3:a:google:tensorflow:*:*:*:*:lite:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "2.3.1", "versionStartIncluding": "2.3.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2021-11-18T17:27Z"}