PYSEC-2021-184

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/tensorflow/PYSEC-2021-184.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2021-184
Aliases
Published
2021-05-14T20:15:00Z
Modified
2023-12-06T01:01:05.322148Z
Summary
[none]
Details

TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a segfault and denial of service via accessing data outside of bounds in tf.raw_ops.QuantizedBatchNormWithGlobalNormalization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantizedbatchnorm_op.cc#L176-L189) assumes the inputs are not empty. If any of these inputs is empty, .flat<T>() is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

References

Affected packages

PyPI / tensorflow

Package

Affected ranges

Type
GIT
Repo
https://github.com/tensorflow/tensorflow
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0rc0
Introduced
2.2.0
Fixed
2.3.0rc0
Introduced
2.3.0
Fixed
2.3.4
Introduced
2.4.0
Fixed
2.4.3

Affected versions

0.*

0.12.0rc0
0.12.0rc1
0.12.0
0.12.1

1.*

1.0.0
1.0.1
1.1.0rc0
1.1.0rc1
1.1.0rc2
1.1.0
1.2.0rc0
1.2.0rc1
1.2.0rc2
1.2.0
1.2.1
1.3.0rc0
1.3.0rc1
1.3.0rc2
1.3.0
1.4.0rc0
1.4.0rc1
1.4.0
1.4.1
1.5.0rc0
1.5.0rc1
1.5.0
1.5.1
1.6.0rc0
1.6.0rc1
1.6.0
1.7.0rc0
1.7.0rc1
1.7.0
1.7.1
1.8.0rc0
1.8.0rc1
1.8.0
1.9.0rc0
1.9.0rc1
1.9.0rc2
1.9.0
1.10.0rc0
1.10.0rc1
1.10.0
1.10.1
1.11.0rc0
1.11.0rc1
1.11.0rc2
1.11.0
1.12.0rc0
1.12.0rc1
1.12.0rc2
1.12.0
1.12.2
1.12.3
1.13.0rc0
1.13.0rc1
1.13.0rc2
1.13.1
1.13.2
1.14.0rc0
1.14.0rc1
1.14.0
1.15.0rc0
1.15.0rc1
1.15.0rc2
1.15.0rc3
1.15.0
1.15.2
1.15.3
1.15.4
1.15.5

2.*

2.0.0a0
2.0.0b0
2.0.0b1
2.0.0rc0
2.0.0rc1
2.0.0rc2
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.1.0rc0
2.1.0rc1
2.1.0rc2
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.2.0
2.2.1
2.2.2
2.2.3
2.3.0
2.3.1
2.3.2
2.3.3
2.4.0
2.4.1
2.4.2