CVE-2021-41202Incorrect Conversion between Numeric Types in Tensorflow

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 89.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 5
Latest updateNov 10

Description

TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorF

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.4.02.4.4+3
CVEListV5tensorflow/tensorflow< 2.4.4+2
PyPIintel/optimization_for_tensorflow2.6.02.6.1+5

Patches

🔴Vulnerability Details

4
OSV
Overflow/crash in `tf.range`2021-11-10
GHSA
Overflow/crash in `tf.range`2021-11-10
OSV
CVE-2021-41202: TensorFlow is an open source platform for machine learning2021-11-05
CVEList
Overflow/crash in `tf.range`2021-11-05

📋Vendor Advisories

1
Debian
CVE-2021-41202: tensorflow - TensorFlow is an open source platform for machine learning. In affected versions...2021
CVE-2021-41202 — Tensorflow vulnerability | cvebase