The implementations of <code>Sparse*Cwise*</code> ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or
CHECK-fails when building new
TensorShape objects (so, assert failures based denial of service):
import tensorflow as tf import numpy as np tf.raw_ops.SparseDenseCwiseDiv( sp_indices=np.array([]), sp_values=np.array(), sp_shape=np.array([92233720368., 92233720368]), dense=np.array())
We are missing some validation on the shapes of the input tensors as well as directly constructing a large
TensorShape with user-provided dimensions. The latter is an instance of TFSA-2021-198 (CVE-2021-41197) and is easily fixed by replacing a call to
TensorShape constructor with a call to
BuildTensorShape static helper factory.
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.