Reference binding to null in `ParameterizedTruncatedNormal`
Package
Affected versions
< 2.1.4
>= 2.2.0, < 2.2.3
>= 2.3.0, < 2.3.3
>= 2.4.0, < 2.4.2
Patched versions
2.1.4
2.2.3
2.3.3
2.4.2
< 2.1.4
>= 2.2.0, < 2.2.3
>= 2.3.0, < 2.3.3
>= 2.4.0, < 2.4.2
2.1.4
2.2.3
2.3.3
2.4.2
< 2.1.4
>= 2.2.0, < 2.2.3
>= 2.3.0, < 2.3.3
>= 2.4.0, < 2.4.2
2.1.4
2.2.3
2.3.3
2.4.2
Description
Published by the National Vulnerability Database
May 14, 2021
Reviewed
May 18, 2021
Published to the GitHub Advisory Database
May 21, 2021
Last updated
Nov 1, 2024
Impact
An attacker can trigger undefined behavior by binding to null pointer in
tf.raw_ops.ParameterizedTruncatedNormal
:This is because the implementation does not validate input arguments before accessing the first element of
shape
:int32 num_batches = shape_tensor.flat<int32>()(0);
If
shape
argument is empty, thenshape_tensor.flat<T>()
is an empty array.Patches
We have patched the issue in GitHub commit 5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8.
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
References