Логотип exploitDog
bind:CVE-2021-37669
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-37669

Количество 4

Количество 4

nvd логотип

CVE-2021-37669

больше 4 лет назад

TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/image/non_max_suppression_op.cc#L170-L271) uses a user controlled argument to resize a `std::vector`. However, as `std::vector::resize` takes the size argument as a `size_t` and `output_size` is an `int`, there is an implicit conversion to unsigned. If the attacker supplies a negative value, this conversion results in a crash. A similar issue occurs in `CombinedNonMaxSuppression`. We have patched the issue in GitHub commit 3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d and commit [b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2021-37669

больше 4 лет назад

TensorFlow is an end-to-end open source platform for machine learning. ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-vmjw-c2vp-p33c

больше 4 лет назад

Crash in NMS ops caused by integer conversion to unsigned

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:10014-1

больше 3 лет назад

Security update for tensorflow2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-37669

TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/image/non_max_suppression_op.cc#L170-L271) uses a user controlled argument to resize a `std::vector`. However, as `std::vector::resize` takes the size argument as a `size_t` and `output_size` is an `int`, there is an implicit conversion to unsigned. If the attacker supplies a negative value, this conversion results in a crash. A similar issue occurs in `CombinedNonMaxSuppression`. We have patched the issue in GitHub commit 3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d and commit [b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-37669

TensorFlow is an end-to-end open source platform for machine learning. ...

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-vmjw-c2vp-p33c

Crash in NMS ops caused by integer conversion to unsigned

CVSS3: 5.5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2022:10014-1

Security update for tensorflow2

больше 3 лет назад

Уязвимостей на страницу