{"id":"PYSEC-2021-149","details":"TensorFlow is an end-to-end open source platform for machine learning. If the `splits` argument of `RaggedBincount` does not specify a valid `SparseTensor`(https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow. This will cause a read from outside the bounds of the `splits` tensor buffer in the implementation of the `RaggedBincount` op(https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L433). Before the `for` loop, `batch_idx` is set to 0. The user controls the `splits` array, making it contain only one element, 0. Thus, the code in the `while` loop would increment `batch_idx` and then try to read `splits(1)`, which is outside of bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected.","aliases":["BIT-tensorflow-2021-29512","CVE-2021-29512","GHSA-4278-2v5v-65r4","PYSEC-2021-440","PYSEC-2021-638"],"modified":"2023-12-06T00:46:01.680717Z","published":"2021-05-14T19:15:00Z","references":[{"type":"ADVISORY","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4278-2v5v-65r4"},{"type":"FIX","url":"https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5"}],"affected":[{"package":{"name":"tensorflow","ecosystem":"PyPI","purl":"pkg:pypi/tensorflow"},"ranges":[{"type":"GIT","repo":"https://github.com/tensorflow/tensorflow","events":[{"introduced":"0"},{"fixed":"eebb96c2830d48597d055d247c0e9aebaea94cd5"}]},{"type":"ECOSYSTEM","events":[{"introduced":"2.3.0"},{"fixed":"2.3.3"},{"introduced":"2.4.0"},{"fixed":"2.4.2"}]}],"versions":["2.3.0","2.3.1","2.3.2","2.4.0","2.4.1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/tensorflow/PYSEC-2021-149.yaml"}}],"schema_version":"1.7.3"}