Learn about CVE-2021-41199 affecting TensorFlow versions >= 2.6.0, < 2.6.1, >= 2.5.0, < 2.5.2, < 2.4.4. Find out the impact, mitigation steps, and prevention techniques.
TensorFlow is an open-source platform for machine learning. In affected versions, calling
tf.image.resize
with a large input argument can cause a crash due to an overflow issue.
Understanding CVE-2021-41199
Affected Version Ranges: >= 2.6.0, < 2.6.1, >= 2.5.0, < 2.5.2, < 2.4.4
What is CVE-2021-41199?
The vulnerability in TensorFlow arises when
tf.image.resize
is invoked with a substantial input causing an overflow, leading to a CHECK
-failure and crashing the TensorFlow process.
The Impact of CVE-2021-41199
Technical Details of CVE-2021-41199
Vulnerability Description
The issue occurs when the number of elements in the output tensor exceeds the
int64_t
type, triggering an overflow detected by a CHECK
statement, resulting in process termination.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited by calling
tf.image.resize
with large input arguments, causing the process to terminate due to the overflow issue.
Mitigation and Prevention
Immediate Steps to Take
tf.image.resize
with excessively large arguments.Long-Term Security Practices
Patching and Updates