CVE-2021-29571 - log back

CVE-2021-29571 edited at 14 May 2021 21:50:58
Type
- Arbitrary code execution
+ Information disclosure
CVE-2021-29571 edited at 14 May 2021 21:40:23
Severity
- Low
+ Medium
Type
- Unknown
+ Arbitrary code execution
CVE-2021-29571 edited at 14 May 2021 21:31:27
Severity
- Unknown
+ Low
Remote
- Unknown
+ Local
Description
+ A security issue has been found in TensorFlow before version 2.4.2. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption. If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices.
References
+ https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6
+ https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517
CVE-2021-29571 created at 14 May 2021 20:37:16
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes