Lucene search

K
githubGitHub Advisory DatabaseGHSA-786J-5QWQ-R36X
HistoryNov 10, 2021 - 7:12 p.m.

Segfault while copying constant resource tensor

2021-11-1019:12:14
CWE-824
GitHub Advisory Database
github.com
13
tensorflow
segfault
constant tensor
grappler optimizer
github commit
resource tensor
segmentation fault
patch
tensorflow 2.7.0
cherrypick
security guide
deep copy

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

12.6%

Impact

During TensorFlow’s Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change.

Patches

We have patched the issue in GitHub commit 7731e8dfbe4a56773be5dc94d631611211156659.

The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions

Affected configurations

Vulners
Node
tensorflow-gpuRange<2.4.4
OR
tensorflow-gpuRange2.5.02.5.2
OR
tensorflow-gpuRange2.6.02.6.1
OR
tensorflow-cpuRange<2.4.4
OR
tensorflow-cpuRange2.5.02.5.2
OR
tensorflow-cpuRange2.6.02.6.1
OR
tensorflowtensorflowRange<2.4.4
OR
tensorflowtensorflowRange2.5.02.5.2
OR
tensorflowtensorflowRange2.6.02.6.1
VendorProductVersionCPE
*tensorflow-gpu*cpe:2.3:a:*:tensorflow-gpu:*:*:*:*:*:*:*:*
*tensorflow-cpu*cpe:2.3:a:*:tensorflow-cpu:*:*:*:*:*:*:*:*
tensorflowtensorflow*cpe:2.3:a:tensorflow:tensorflow:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

12.6%

Related for GHSA-786J-5QWQ-R36X