
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an end-to-end open source platform for machine learning, was found to contain a vulnerability (CVE-2021-29514) in its RaggedBincount operation. The vulnerability was discovered in versions 2.3.0 through 2.5.0 and was reported by members of the Aivul Team from Qihoo 360. The issue was patched in TensorFlow versions 2.3.3 and 2.4.2 (GitHub Advisory).
The vulnerability occurs when the 'splits' argument of RaggedBincount does not specify a valid SparseTensor. In the implementation, before a for loop, batchidx is set to 0. If an attacker sets splits(0) to be 7, the while loop does not execute and batchidx remains 0, resulting in writing to out(-1, bin), which is before the heap allocated buffer for the output tensor. This leads to a heap buffer overflow condition (GitHub Advisory).
The vulnerability allows attackers to trigger a heap buffer overflow, which could potentially lead to memory corruption and unauthorized access to memory regions. This could result in system crashes or potential arbitrary code execution (GitHub Advisory).
The vulnerability was patched in GitHub commit eebb96c2830d48597d055d247c0e9aebaea94cd5 and included in TensorFlow 2.5.0. The fix was also backported to TensorFlow 2.4.2 and TensorFlow 2.3.3. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."