Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a SavedModel
such that any binary op would trigger CHECK
failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the dtype
no longer matches the dtype
expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If Tin
and Tout
dont match the type of data in out
and input_*
tensors then flat<*>
would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a CHECK
crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tensorflow | * | 2.5.2 (including) | |
Tensorflow | 2.6.0 (including) | 2.6.2 (including) | |
Tensorflow | 2.7.0 (including) | 2.7.0 (including) |
While assertion is good for catching logic errors and reducing the chances of reaching more serious vulnerability conditions, it can still lead to a denial of service. For example, if a server handles multiple simultaneous connections, and an assert() occurs in one single connection that causes all other connections to be dropped, this is a reachable assertion that leads to a denial of service.