In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the fill
argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a printf
call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "digest": { "line_hashes": [ "206617985118558538529064265088358506050", "36011196493717310763760445257547073539", "192696605584224270812170664389958789291", "1980539605768254906950715195079541493", "152339483582920554484913187528460250088", "143950074638617193147727768190516940432", "66589887189099342910750197368961127255" ], "threshold": 0.9 }, "id": "CVE-2020-15203-cfa10dde", "target": { "file": "tensorflow/core/kernels/as_string_op.cc" }, "deprecated": false, "source": "https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83" } ] }