Improper Input Validation Affecting tensorflow-cpu package, versions [2.5.0,2.5.1) [2.4.0,2.4.3) [,2.3.4)
Threat Intelligence
EPSS
0.04% (14th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-TENSORFLOWCPU-1540716
- published 13 Aug 2021
- disclosed 13 Aug 2021
- credit Unknown
Introduced: 13 Aug 2021
CVE-2021-37670 Open this link in a new tabHow to fix?
Upgrade tensorflow-cpu
to version 2.5.1, 2.4.3, 2.3.4 or higher.
Overview
tensorflow-cpu is a machine learning framework.
Affected versions of this package are vulnerable to Improper Input Validation. An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to tf.raw_ops.UpperBound
. The implementation does not validate the rank of sorted_input
argument. A similar issue occurs in tf.raw_ops.LowerBound
.
References
CVSS Scores
version 3.1