In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
2020-09-25T19:15:15.620
2024-11-21T05:05:04.620
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | tensorflow | < 1.15.4 | Yes | |
| Application | tensorflow | < 2.0.3 | Yes | |
| Application | tensorflow | < 2.1.2 | Yes | |
| Application | tensorflow | < 2.2.1 | Yes | |
| Application | tensorflow | < 2.3.1 | Yes | |
| Operating System | opensuse | leap | 15.2 | Yes |