CVE Vulnerabilities

CVE-2021-37638

NULL Pointer Dereference

Published: Aug 12, 2021 | Modified: Aug 18, 2021
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for row_partition_types of tf.raw_ops.RaggedTensorToTensor API results in a null pointer dereference and undefined behavior. The implementation accesses the first element of a user supplied list of values without validating that the provided list is not empty. We have patched the issue in GitHub commit 301ae88b331d37a2a16159b65b255f4f9eb39314. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Tensorflow Google 2.3.0 (including) 2.3.4 (excluding)
Tensorflow Google 2.4.0 (including) 2.4.3 (excluding)
Tensorflow Google 2.5.0 (including) 2.5.0 (including)
Tensorflow Google 2.6.0-rc0 (including) 2.6.0-rc0 (including)
Tensorflow Google 2.6.0-rc1 (including) 2.6.0-rc1 (including)
Tensorflow Google 2.6.0-rc2 (including) 2.6.0-rc2 (including)

Potential Mitigations

References