CVE-2021-41208: Incomplete validation in boosted trees code
(updated )
The code for boosted trees in TensorFlow is still missing validation. As a result, attackers can trigger denial of service (via dereferencing nullptr
s or via CHECK
-failures) as well as abuse undefined behavior (binding references to nullptr
s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call.
Note: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream TensorFlow Decision Forests project which is newer and supports more features. We will deprecate TensorFlow’s boosted trees APIs in subsequent releases.
References
- github.com/advisories/GHSA-57wx-m983-2f88
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-cpu/PYSEC-2021-617.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-gpu/PYSEC-2021-815.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow/PYSEC-2021-400.yaml
- github.com/tensorflow/tensorflow
- github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c
- github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88
- nvd.nist.gov/vuln/detail/CVE-2021-41208
Detect and mitigate CVE-2021-41208 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →