5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
40.2%
TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an int64_t
. If an overflow occurs, MultiplyWithoutOverflow
would return a negative result. In the majority of TensorFlow codebase this then results in a CHECK
-failure. Newer constructs exist which return a Status
instead of crashing the binary.
For example AddDim
calls should be replaced by AddDimWithStatus
.
This is similar to CVE-2021-29584 (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs).
We have patched the issue in GitHub commits 7c1692bd417eb4f9b33ead749a41166d6080af85 (merging #51732), d81b1351da3e8c884ff836b64458d94e4a157c15 (merging #51717), a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf (merging #51658), and d81b1351da3e8c884ff836b64458d94e4a157c15 (merging #51973). It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered.
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
This vulnerability has been reported externally via GitHub issue, GitHub issue and GitHub issue.
CPE | Name | Operator | Version |
---|---|---|---|
tensorflow-gpu | lt | 2.4.4 | |
tensorflow-gpu | lt | 2.5.2 | |
tensorflow-gpu | lt | 2.6.1 | |
tensorflow-cpu | lt | 2.4.4 | |
tensorflow-cpu | lt | 2.5.2 | |
tensorflow-cpu | lt | 2.6.1 | |
tensorflow | lt | 2.4.4 | |
tensorflow | lt | 2.5.2 | |
tensorflow | lt | 2.6.1 |
github.com/advisories/GHSA-prcg-wp5q-rv7p
github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85
github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf
github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15
github.com/tensorflow/tensorflow/issues/46890
github.com/tensorflow/tensorflow/issues/51908
github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p
nvd.nist.gov/vuln/detail/CVE-2021-41197
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
40.2%