// For flags

CVE-2021-41211

Heap OOB read in shape inference for `QuantizeV2`

Severity Score

7.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `QuantizeV2` can trigger a read outside of bounds of heap allocated array. This occurs whenever `axis` is a negative value less than `-1`. In this case, we are accessing data before the start of a heap buffer. The code allows `axis` to be an optional argument (`s` would contain an `error::NOT_FOUND` error code). Otherwise, it assumes that `axis` is a valid index into the dimensions of the `input` tensor. If `axis` is less than `-1` then this results in a heap OOB read. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected.

TensorFlow es una plataforma de código abierto para el aprendizaje automático. En las versiones afectadas, el código de inferencia de forma para "QuantizeV2" puede desencadenar una lectura fuera de límites de la matriz asignada a la pila. Esto ocurre siempre que el "eje" es un valor negativo menor que "1". En este caso, estamos accediendo a los datos antes del inicio de un buffer de heap. El código permite que "axis" sea un argumento opcional ("s" contendría un código de error "error::NOT_FOUND"). En caso contrario, asume que "axis" es un índice válido en las dimensiones del tensor "input". Si "axis" es menor que "-1", se produce una lectura OOB de la pila. La corrección será incluida en TensorFlow versión 2.7.0. También vamos a incluir este commit en TensorFlow versión 2.6.1, ya que esta versión es la única que también está afectada

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-09-15 CVE Reserved
  • 2021-11-05 CVE Published
  • 2023-05-29 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-125: Out-of-bounds Read
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Tensorflow
Search vendor "Google" for product "Tensorflow"
2.6.0
Search vendor "Google" for product "Tensorflow" and version "2.6.0"
-
Affected