Out-of-bounds Read Affecting tensorflow/tensorflow package, versions [2.3.0,2.3.4)[2.4.0,2.4.3)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TENSORFLOWTENSORFLOW-2333521
  • published12 Jan 2022
  • disclosed12 Aug 2021
  • creditUnknown

Introduced: 12 Aug 2021

CVE-2021-37635  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade tensorflow/tensorflow to version 2.3.4, 2.4.3 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read. TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data. The implementation fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. We have patched the issue in GitHub commit 87158f43f05f2720a374f3e6d22a7aaa3a33f750. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

CVSS Scores

version 3.1