ID CVE-2021-37661
Summary TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantile_ops.cc#L96) does not validate that `num_streams` only contains non-negative numbers. In turn, [this results in using this value to allocate memory](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantiles/quantile_stream_resource.h#L31-L40). However, `reserve` receives an unsigned integer so there is an implicit conversion from a negative value to a large positive unsigned. This results in a crash from the standard library. We have patched the issue in GitHub commit 8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
References
Vulnerable Configurations
  • cpe:2.3:a:google:tensorflow:2.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:-:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:-:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc0:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc0:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc0:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc0:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc0:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc1:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc1:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc1:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc1:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc2:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc2:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc2:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc2:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc3:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc3:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc3:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc3:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.0:rc4:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.0:rc4:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.6.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.6.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.6.0:rc0:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:-:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:-:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:-:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:-:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:-:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc0:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc0:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc0:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc0:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc0:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc1:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc1:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc1:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc1:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc2:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc2:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.0:rc2:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.0:rc2:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.1:*:*:*:-:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.1:*:*:*:-:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.1:*:*:*:lite:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.1:*:*:*:lite:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:google:tensorflow:2.5.0:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 21-11-2024 - 06:15)
Impact:
Exploitability:
CWE CWE-681
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:P
Last major update 21-11-2024 - 06:15
Published 12-08-2021 - 21:15
Last modified 21-11-2024 - 06:15
Back to Top