In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-09-25T18:46:08
Updated: 2024-08-04T13:08:22.972Z
Reserved: 2020-06-25T00:00:00
Link: CVE-2020-15203
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-09-25T19:15:15.620
Modified: 2024-11-21T05:05:04.620
Link: CVE-2020-15203
Redhat
No data.