Denial of Service (DoS) Affecting tensorflow/tensorflow package, versions [2.3.0,2.3.4)[2.4.0,2.4.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TENSORFLOWTENSORFLOW-2333529
  • published12 Jan 2022
  • disclosed12 Aug 2021
  • creditUnknown

Introduced: 12 Aug 2021

CVE-2021-37661  (opens in a new tab)
CWE-681  (opens in a new tab)

How to fix?

Upgrade tensorflow/tensorflow to version 2.3.4, 2.4.3 or higher.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in boosted_trees_create_quantile_stream_resource by using negative arguments. The implementation does not validate that num_streams only contains non-negative numbers. In turn, this results in using this value to allocate memory. However, reserve receives an unsigned integer so there is an implicit conversion from a negative value to a large positive unsigned. This results in a crash from the standard library. We have patched the issue in GitHub commit 8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

CVSS Scores

version 3.1