Safety vulnerability ID: 57804
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Tensorflow-rocm version 2.3.4, 2.4.3, 2.5.1 and 2.6.0 include a fix for CVE-2021-37663:
In affected versions, due to incomplete validation in "tf.raw_ops.QuantizeV2", an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The implementation (https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that "min_range" and "max_range" both have the same non-zero number of elements. If "axis" is provided (i.e., not "-1"), then validation should check that it is a value in range for the rank of "input" tensor and then the lengths of "min_range" and "max_range" inputs match the "axis" dimension of the "input" tensor. The Tensorflow team has patched the issue in GitHub commit 6da6620efad397c85493b8f8667b821403516708.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j
https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708
Latest version: 2.14.0.600
TensorFlow is an open source machine learning framework for everyone.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application