CVE-2021-29542Incorrect Calculation of Buffer Size in Tensorflow

Severity
5.5MEDIUMNVD
CNA2.5
EPSS
0.0%
top 96.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 14
Latest updateMay 21

Description

TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L171-L185) fails to consider corner cases where input would be split in such a way that the generated tokens should only contain padding elements. If input is suc

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.2.02.2.3+3
CVEListV5tensorflow/tensorflow< 2.1.4+3
PyPIintel/optimization_for_tensorflow2.2.02.2.3+4

Patches

🔴Vulnerability Details

4
OSV
Heap buffer overflow in `StringNGrams`2021-05-21
GHSA
Heap buffer overflow in `StringNGrams`2021-05-21
OSV
CVE-2021-29542: TensorFlow is an end-to-end open source platform for machine learning2021-05-14
CVEList
Heap buffer overflow in `StringNGrams`2021-05-14

📋Vendor Advisories

1
Debian
CVE-2021-29542: tensorflow - TensorFlow is an end-to-end open source platform for machine learning. An attack...2021
CVE-2021-29542 — Incorrect Calculation of Buffer Size | cvebase