CVE-2021-29612

Source
https://cve.org/CVERecord?id=CVE-2021-29612
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29612.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-29612
Aliases
Related
Published
2021-05-14T20:15:15.990Z
Modified
2026-02-24T11:41:16.014388Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a heap buffer overflow in Eigen implementation of tf.raw_ops.BandedTriangularSolve. The implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/bandedtriangularsolveop.cc#L269-L278) calls ValidateInputTensors for input validation but fails to validate that the two tensors are not empty. Furthermore, since OP_REQUIRES macro only stops execution of current function after setting ctx->status() to a non-OK value, callers of helper functions that use OP_REQUIRES must check value of ctx->status() before continuing. This doesn't happen in this op's implementation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/linalg/bandedtriangularsolveop.cc#L219), hence the validation that is present is also not effective. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

References

Affected packages

Git / github.com/tensorflow/tensorflow

Affected ranges

Type
GIT
Repo
https://github.com/tensorflow/tensorflow
Events

Database specific

vanir_signatures
[
    {
        "id": "CVE-2021-29612-1c84e1e8",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "237189726091404124047497921761139473302",
                "106216832316178088476603597081075999600",
                "54686572137649404300439552268139249232"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "tensorflow/core/kernels/sparse_sparse_binary_op_shared.cc"
        },
        "source": "https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2",
        "signature_type": "Line"
    },
    {
        "id": "CVE-2021-29612-47a79b1c",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "74362473220782431632780838319842760999",
                "260372045928666315207474805728225556263",
                "108861991243610225526089934665803922560",
                "276626086644503099170362244807152488123"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "tensorflow/core/kernels/linalg/banded_triangular_solve_op.cc"
        },
        "source": "https://github.com/tensorflow/tensorflow/commit/0ab290774f91a23bebe30a358fde4e53ab4876a0",
        "signature_type": "Line"
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29612.json"