Improper Input Validation Affecting tensorflow-cpu package, versions [2.5.0,2.5.1) [2.4.0,2.4.3) [,2.3.4)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-TENSORFLOWCPU-1540750
- published 13 Aug 2021
- disclosed 13 Aug 2021
- credit Unknown
Introduced: 13 Aug 2021
CVE-2021-37648 Open this link in a new tabHow to fix?
Upgrade tensorflow-cpu
to version 2.5.1, 2.4.3, 2.3.4 or higher.
Overview
tensorflow-cpu is a machine learning framework.
Affected versions of this package are vulnerable to Improper Input Validation. The code for tf.raw_ops.SaveV2
does not properly validate the inputs and an attacker can trigger a null pointer dereference. The implementation uses ValidateInputs
to check that the input arguments are valid. This validation would have caught the illegal state represented by the reproducer above. However, the validation uses OP_REQUIRES
which translates to setting the Status
object of the current OpKernelContext
to an error status, followed by an empty return
statement which just terminates the execution of the function it is present in. However, this does not mean that the kernel execution is finalized: instead, execution continues from the next line in Compute
that follows the call to ValidateInputs
. This is equivalent to lacking the validation.