CVE-2021-29560

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
14/05/2021
Last modified:
25/04/2022

Description

TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) uses the same index to access two arrays in parallel. Since the user controls the shape of the input arguments, an attacker could trigger a heap OOB access when `parent_output_index` is shorter than `row_split`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.1.4 (excluding)
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.2.0 (including) 2.2.3 (excluding)
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.3.0 (including) 2.3.3 (excluding)
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.4.0 (including) 2.4.2 (excluding)