
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an end-to-end open source platform for machine learning, was found to contain a vulnerability (CVE-2021-29566) that allows attackers to write outside the bounds of heap allocated arrays through the tf.raw_ops.Dilation2DBackpropInput operation. The vulnerability was discovered by Yakun Zhang and Ying Wang of Baidu X-Team and affects TensorFlow versions prior to 2.5.0 (GitHub Advisory).
The vulnerability stems from a lack of validation in the implementation before writing to the output array. While the values for hout and wout are guaranteed to be in range for outbackprop (as they are loop indices bounded by the size of the array), there are no similar guarantees relating hinmax/winmax and inbackprop. This implementation flaw can lead to heap buffer overflow when invalid arguments are passed to the operation (GitHub Advisory).
The vulnerability allows attackers to write outside the bounds of heap allocated arrays, potentially leading to memory corruption and unauthorized access to memory regions. This could result in system crashes or potential arbitrary code execution (GitHub Advisory).
The vulnerability has been patched in TensorFlow 2.5.0. The fix has also been backported to TensorFlow versions 2.4.2, 2.3.3, 2.2.3, and 2.1.4. Users are advised to upgrade to these patched versions. The fix was implemented in GitHub commit 3f6fe4dfef6f57e768260b48166c27d148f3015f, which adds proper validation checks (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."