CVE-2021-37663: Incomplete validation in `QuantizeV2`
(updated )
Due to incomplete validation in tf.raw_ops.QuantizeV2
, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays:
import tensorflow as tf
tf.raw_ops.QuantizeV2(
input=[1,2,3],
min_range=[1,2],
max_range=[],
T=tf.qint32,
mode='SCALED',
round_mode='HALF_AWAY_FROM_ZERO',
narrow_range=False,
axis=1,
ensure_minimum_range=3)
References
- github.com/advisories/GHSA-g25h-jr74-qp5j
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-cpu/PYSEC-2021-576.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-gpu/PYSEC-2021-774.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow/PYSEC-2021-285.yaml
- github.com/tensorflow/tensorflow
- github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708
- github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j
- nvd.nist.gov/vuln/detail/CVE-2021-37663
Detect and mitigate CVE-2021-37663 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →