Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.ImmutableConst`(https://www.tensorflow.org/api_docs/python/tf/raw_ops/ImmutableConst) with a `dtype` of `tf.resource` or `tf.variant` results in a segfault in the implementation as code assumes that the tensor contents are pure scalars. We have patched the issue in 4f663d4b8f0bec1b48da6fa091a7d29609980fa4 and will release TensorFlow 2.5.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. If using `tf.raw_ops.ImmutableConst` in code, you can prevent the segfault by inserting a filter for the `dtype` argument.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tensorflow | < 2.1.4 |
Related Weaknesses (CWE)
References
- https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d296PatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g4h2-gqm3-c9wqExploitPatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/commit/4f663d4b8f0bec1b48da6fa091a7d296PatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g4h2-gqm3-c9wqExploitPatchThird Party Advisory
FAQ
What is CVE-2021-29539?
CVE-2021-29539 is a vulnerability with a CVSS score of 2.5 (LOW). TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_ops.ImmutableConst`(https://www.tensorflow.org/api_docs/python/tf/raw_ops/ImmutableConst) with a `dtype` of `tf.r...
How severe is CVE-2021-29539?
CVE-2021-29539 has been rated LOW with a CVSS base score of 2.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29539?
Check the references section above for vendor advisories and patch information. Affected products include: Google Tensorflow.