We found results for “”
CVE-2021-29566
Good to know:
Date: May 14, 2021
TensorFlow is an end-to-end open source platform for machine learning. An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to "tf.raw_ops.Dilation2DBackpropInput". This is because the implementation(https://github.com/tensorflow/tensorflow/blob/afd954e65f15aea4d438d0a219136fc4a63a573d/tensorflow/core/kernels/dilation_ops.cc#L321-L322) does not validate before writing to the output array. The values for "h_out" and "w_out" are guaranteed to be in range for "out_backprop" (as they are loop indices bounded by the size of the array). However, there are no similar guarantees relating "h_in_max"/"w_in_max" and "in_backprop". The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
Language: Python
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Out-of-bounds Write
CWE-787Top Fix
Upgrade Version
Upgrade to version tensorflow-cpu - 2.1.4;tensorflow-cpu - 2.2.3;tensorflow-cpu - 2.3.3;tensorflow-cpu - 2.4.2;tensorflow - 2.1.4;tensorflow - 2.2.3;tensorflow - 2.3.3;tensorflow - 2.4.2;tensorflow - 2.2.0rc0;tensorflow-gpu - 2.1.4;tensorflow-gpu - 2.2.3;tensorflow-gpu - 2.3.3;tensorflow-gpu - 2.4.2;tensorflow-gpu - 2.2.0rc0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | LOW |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | LOCAL |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | PARTIAL |
| Availability (A): | PARTIAL |
| Additional information: |
Vulnerabilities
Projects
Contact Us


