Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-1550

Опубликовано: 11 мар. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 9.8

Описание

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needed

esm-apps/focal

needed

focal

ignored

end of standard support, was needed
jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

questing

DNE

upstream

released

3.9.0

Показывать по

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.2
redhat
11 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
nvd
11 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
msrc
6 месяцев назад

Arbitrary Code Execution via Crafted Keras Config for Model Loading

CVSS3: 9.8
debian
11 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, ...

github
11 месяцев назад

Arbitrary Code Execution via Crafted Keras Config for Model Loading

9.8 Critical

CVSS3