TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 | third party advisory release notes |
https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 | third party advisory release notes |
https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 | third party advisory release notes |
https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0 | third party advisory release notes |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54ch-gjq5-4976 | patch third party advisory exploit |
https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9 | third party advisory patch |
https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L296-L320 | third party advisory |
https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L480-L482 | third party advisory |