CVE-2021-29612: Buffer Copy without Checking Size of Input
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a heap buffer overflow in Eigen implementation of tf.raw_ops.BandedTriangularSolve
. The implementation calls ValidateInputTensors
for input validation but fails to validate that the two tensors are not empty. Furthermore, since OP_REQUIRES
macro only stops execution of current function after setting ctx->status
to a non-OK value, callers of helper functions that use OP_REQUIRES
must check value of ctx->status
before continuing. This doesn’t happen in this op’s implementation, hence the validation that is present is also not effective. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
References
- github.com/advisories/GHSA-2xgj-xhgf-ggjv
- github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0
- github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2
- github.com/tensorflow/tensorflow/security/advisories/GHSA-2xgj-xhgf-ggjv
- nvd.nist.gov/vuln/detail/CVE-2021-29612
Detect and mitigate CVE-2021-29612 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →