CVE-2021-41202

Name
CVE-2021-41202
Description
TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx
MISC https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94
MISC https://github.com/tensorflow/tensorflow/issues/46912
MISC https://github.com/tensorflow/tensorflow/issues/46889
MISC https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= 2.4.0 < 2.4.4
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= 2.5.0 < 2.5.2
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= 2.6.0 < 2.6.1
cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:* tensorflow == None == 2.7.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status