CVE-2021-37679 — Out-of-bounds Read in Tensorflow
CWE-125 — Out-of-bounds ReadCWE-681 — Incorrect Conversion between Numeric Types6 documents5 sources
Severity
7.8HIGHNVD
CNA7.1
EPSS
0.0%
top 90.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 12
Latest updateAug 25
Description
TensorFlow is an end-to-end open source platform for machine learning. In affected versions it is possible to nest a `tf.map_fn` within another `tf.map_fn` call. However, if the input tensor is a `RaggedTensor` and there is no function signature provided, code assumes the output is a fully specified tensor and fills output buffer with uninitialized contents from the heap. The `t` and `z` outputs should be identical, however this is not the case. The last row of `t` contains data from the heap wh…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
4OSV
▶
📋Vendor Advisories
1Debian▶
CVE-2021-37679: tensorflow - TensorFlow is an end-to-end open source platform for machine learning. In affect...↗2021