CVE-2021-37679Out-of-bounds Read in Tensorflow

Severity
7.8HIGHNVD
CNA7.1
EPSS
0.0%
top 90.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 12
Latest updateAug 25

Description

TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills output buffer with uninitialized contents from the heap. The `t` and `z` outputs should be identical, however this is not the case. The last row of `t` contains data from the heap wh

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDgoogle/tensorflow2.3.02.3.4+3
CVEListV5tensorflow/tensorflow< 2.3.4+2
PyPIintel/optimization_for_tensorflow2.3.02.3.4+4

Patches

🔴Vulnerability Details

4
OSV
Heap OOB in nested `tf.map_fn` with `RaggedTensor`s2021-08-25
GHSA
Heap OOB in nested `tf.map_fn` with `RaggedTensor`s2021-08-25
OSV
CVE-2021-37679: TensorFlow is an end-to-end open source platform for machine learning2021-08-12
CVEList
Heap OOB in nested `tf.map_fn` with `RaggedTensor`s in TensorFlow2021-08-12

📋Vendor Advisories

1
Debian
CVE-2021-37679: tensorflow - TensorFlow is an end-to-end open source platform for machine learning. In affect...2021
CVE-2021-37679 — Out-of-bounds Read in Tensorflow | cvebase