TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.getfile is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.getfile is not intended for untrusted archives
{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2.5.0"
}
],
"cpe": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
}