BIT-tensorflow-2020-15203

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/tensorflow/BIT-tensorflow-2020-15203.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-tensorflow-2020-15203
Aliases
Published
2024-03-06T11:20:36.172Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the fill argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a printf call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

Database specific
{
    "cpes": [
        "cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / tensorflow

Package

Name
tensorflow
Purl
pkg:bitnami/tensorflow

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15.4
Introduced
2.0.0
Fixed
2.0.3
Introduced
2.1.0
Fixed
2.1.2
Introduced
2.2.0
Fixed
2.2.1
Introduced
2.3.0
Fixed
2.3.1