Lucene search

K
githubGitHub Advisory DatabaseGHSA-XRQM-FPGR-6HHX
HistoryNov 10, 2021 - 7:13 p.m.

Overflow/crash in `tf.range`

2021-11-1019:13:16
CWE-681
GitHub Advisory Database
github.com
22
tensorflow
kernel
overflow
crash
conditional statement
implicit conversion
fix
patch
github
security guide
vulnerability
github issue

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

14.2%

Impact

While calculating the size of the output within the tf.range kernel, there is a conditional statement of type int64 = condition ? int64 : double. Due to C++ implicit conversion rules, both branches of the condition will be cast to double and the result would be truncated before the assignment. This result in overflows:

import tensorflow as tf

tf.sparse.eye(num_rows=9223372036854775807, num_columns=None)

Similarly, tf.range would result in crashes due to overflows if the start or end point are too large.

import tensorflow as tf

tf.range(start=-1e+38, limit=1)

Patches

We have patched the issue in GitHub commits 6d94002a09711d297dbba90390d5482b76113899 (merging #51359) and 1b0e0ec27e7895b9985076eab32445026ae5ca94 (merging #51711).

The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported externally via GitHub issue, GitHub issue and GitHub issue.

Affected configurations

Vulners
Node
tensorflowgpuRange<2.4.4
OR
tensorflowgpuRange<2.5.2
OR
tensorflowgpuRange<2.6.1
OR
tensorflowcpuRange<2.4.4
OR
tensorflowcpuRange<2.5.2
OR
tensorflowcpuRange<2.6.1
OR
tensorflowtensorflowRange<2.4.4
OR
tensorflowtensorflowRange<2.5.2
OR
tensorflowtensorflowRange<2.6.1
VendorProductVersionCPE
tensorflowgpu*cpe:2.3:a:tensorflow:gpu:*:*:*:*:*:*:*:*
tensorflowcpu*cpe:2.3:a:tensorflow:cpu:*:*:*:*:*:*:*:*
tensorflowtensorflow*cpe:2.3:a:tensorflow:tensorflow:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

14.2%

Related for GHSA-XRQM-FPGR-6HHX