CVE-2021-41195
Crash in `tf.math.segment_*` operations
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. This is similar to CVE-2021-29584 (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the implementation (both on CPU and GPU) computes the output shape using `AddDim`. However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use `AddDimWithStatus`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
TensorFlow es una plataforma de código abierto para el aprendizaje automático. En las versiones afectadas, la implementación de las operaciones "tf.math.segment_*" resulta en un aborto relacionado con el fallo "CHECK" (y a una denegación de servicio) si un id de segmento en "segment_ids" es grande. Esto es similar a CVE-2021-29584 (y otras vulnerabilidades similares reportadas en TensorFlow, localizadas en APIs específicas): la implementación (tanto en CPU como en GPU) computa la forma de salida usando "AddDim". Sin embargo, si el número de elementos en el tensor sobrepasa un valor "int64_t", "AddDim" resulta en un fallo "CHECK" que provoca un "std::abort". En su lugar, el código debería usar "AddDimWithStatus". La corrección será incluida en TensorFlow versión 2.7.0. También será incluida este commit en TensorFlow versión 2.6.1, TensorFlow versión 2.5.2, y TensorFlow versión 2.4.4, ya que estos también están afectados y todavía están en el rango admitido
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-09-15 CVE Reserved
- 2021-11-05 CVE Published
- 2024-01-28 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429 | 2021-11-09 | |
https://github.com/tensorflow/tensorflow/issues/46888 | 2021-11-09 | |
https://github.com/tensorflow/tensorflow/pull/51733 | 2021-11-09 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Tensorflow Search vendor "Google" for product "Tensorflow" | < 2.4.4 Search vendor "Google" for product "Tensorflow" and version " < 2.4.4" | - |
Affected
| ||||||
Google Search vendor "Google" | Tensorflow Search vendor "Google" for product "Tensorflow" | >= 2.5.0 < 2.5.2 Search vendor "Google" for product "Tensorflow" and version " >= 2.5.0 < 2.5.2" | - |
Affected
| ||||||
Google Search vendor "Google" | Tensorflow Search vendor "Google" for product "Tensorflow" | >= 2.6.0 < 2.6.1 Search vendor "Google" for product "Tensorflow" and version " >= 2.6.0 < 2.6.1" | - |
Affected
|