In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the fill argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a printf call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"206617985118558538529064265088358506050",
"36011196493717310763760445257547073539",
"192696605584224270812170664389958789291",
"1980539605768254906950715195079541493",
"152339483582920554484913187528460250088",
"143950074638617193147727768190516940432",
"66589887189099342910750197368961127255"
]
},
"target": {
"file": "tensorflow/core/kernels/as_string_op.cc"
},
"source": "https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83",
"id": "CVE-2020-15203-cfa10dde",
"deprecated": false,
"signature_version": "v1"
}
]