CVE-2021-41197
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. This is similar to CVE-2021-29584. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
Published
2021-11-05T20:15:07.843
Last Modified
2024-11-21T06:25:44.853
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 5.5 (MEDIUM)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:N/I:N/A:P
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
3.9
Impact Score
2.9
Weaknesses
-
Type: Secondary
CWE-190
-
Type: Primary
CWE-190
Affected Vendors & Products
References
-
https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85
Patch, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf
Patch, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15
Patch, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/issues/46890
Exploit, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/issues/51908
Exploit, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p
Patch, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/issues/46890
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/issues/51908
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)