VYPR
High severityNVD Advisory· Published Mar 24, 2023· Updated Feb 19, 2025

TensorFlow vulnerable to seg fault in `tf.raw_ops.Print`

CVE-2023-25660

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when the parameter summarize of tf.raw_ops.Print is zero, the new method SummarizeArray<bool> will reference to a nullptr, leading to a seg fault. A fix is included in TensorFlow version 2.12 and version 2.11.1.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tensorflowPyPI
< 2.11.12.11.1
tensorflow-cpuPyPI
< 2.11.12.11.1
tensorflow-gpuPyPI
< 2.11.12.11.1

Affected products

1

Patches

1
6d423b8bcc9a

Quick fix for a vuln in printing empty tensors.

https://github.com/tensorflow/tensorflowMihai MaruseacJan 20, 2023via ghsa
1 file changed · +3 0
  • tensorflow/core/framework/tensor.cc+3 0 modified
    @@ -1297,6 +1297,9 @@ template <>
     string SummarizeArray<bool>(int64_t limit, int64_t num_elts,
                                 const TensorShape& tensor_shape, const char* data,
                                 const bool print_v2) {
    +  if (data == nullptr) {
    +    return strings::StrCat("");  // we already print type and shape
    +  }
       // We first convert all chars to be 0/1 to not get InvalidEnumValue sanitizer
       // error
       auto mutable_data = std::unique_ptr<char[]>(new char[num_elts]);
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.