Log

CVE-2021-37689 created at 13 Aug 2021 07:57:56
Severity
+ Medium
Remote
+ Local
Type
+ Denial of service
Description
+ In TensorFlow before version 2.6.0 an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. This is caused by the MLIR optimization of L2NormalizeReduceAxis operator. The implementation unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements.
References
+ https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh
+ https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955
Notes
CVE-2021-37691 created at 13 Aug 2021 07:57:56
Severity
+ Low
Remote
+ Local
Type
+ Denial of service
Description
+ In TensorFlow before version 2.6.0 an attacker can craft a TFLite model that would trigger a division by zero error in LSH implementation.
References
+ https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9
+ https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3
Notes
CVE-2021-37692 created at 13 Aug 2021 07:57:56
Severity
+ Medium
Remote
+ Local
Type
+ Denial of service
Description
+ In TensorFlow before version 2.6.0 under certain conditions, Go code can trigger a segfault in string deallocation. For string tensors, C.TF_TString_Dealloc is called during garbage collection within a finalizer function. However, tensor structure isn't checked until encoding to avoid a performance penalty. The current method for dealloc assumes that encoding succeeded, but segfaults when a string tensor is garbage collected whose encoding failed (e.g., due to mismatched dimensions). To fix this, the call to set the finalizer function is deferred until NewTensor returns and, if encoding failed for a string tensor, deallocs are determined based on bytes written.
References
+ https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59
+ https://github.com/tensorflow/tensorflow/pull/50508
+ https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22
Notes
CVE-2021-37690 created at 13 Aug 2021 07:57:56
Severity
+ Critical
Remote
+ Local
Type
+ Denial of service
Description
+ In TensorFlow before version 2.6.0 when running shape functions, some functions (such as MutableHashTableShape) produce extra output information in the form of a ShapeAndType struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately; if the upstream code attempts to access this shape information, it can trigger a segfault. ShapeRefiner is mitigating this for normal output shapes by cloning them (and thus putting the newly created shape under ownership of an inference context that will not die), but it is not doing the same for shapes and types. This commit fixes that by doing similar logic on output shapes and types.
References
+ https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg
+ https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1
Notes
AVG-1880 edited at 13 Aug 2021 07:03:08
Affected
- 5.13.9.zen1-1
+ 5.13.10.zen1-1
AVG-1879 edited at 13 Aug 2021 07:02:59
Affected
- 5.13.9.arch1-1
+ 5.13.10.arch1-1
AVG-1594 edited at 13 Aug 2021 07:00:33
Affected
- 5.13.9.arch1-1
+ 5.13.10.arch1-1
AVG-2282 edited at 12 Aug 2021 22:38:16
Affected
- 5.15.2+kde+r214-1
+ 5.15.2+kde+r215-1
AVG-2114 edited at 12 Aug 2021 22:14:22
Affected
- 2.5.1-1
+ 2.6.0-1
AVG-2274 edited at 12 Aug 2021 22:13:59
Affected
- 21.04.3-1
+ 21.08.0-1