Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-41222 : Vulnerability Insights and Analysis

Learn about CVE-2021-41222 impacting TensorFlow versions >= 2.4.4 and < 2.6.1. This vulnerability allows attackers to trigger a segfault in the `SplitV` function due to incorrect handling of negative arguments.

TensorFlow is an open-source machine learning platform. The vulnerability in affected versions triggers a segfault in the

SplitV
implementation due to negative arguments. This CVE has a CVSS base score of 5.5.

Understanding CVE-2021-41222

TensorFlow versions >= 2.4.4 and < 2.6.1 are impacted by a vulnerability that allows attackers to cause a segfault by providing negative arguments to the

SplitV
function.

What is CVE-2021-41222?

The flaw arises when

size_splits
contains multiple values, including at least one negative value. The issue has a medium severity base score of 5.5.

The Impact of CVE-2021-41222

        Base Score: 5.5 (Medium)
        Attack Vector: Local
        Attack Complexity: Low
        Privileges Required: Low
        Availability Impact: High
        Confidentiality Impact: None
        Integrity Impact: None
        User Interaction: None
        Scope: Unchanged

Technical Details of CVE-2021-41222

The following technical details describe the vulnerability in TensorFlow:

Vulnerability Description

The flaw occurs in the

SplitV
operation due to incorrect handling of negative arguments.

Affected Systems and Versions

        TensorFlow version >= 2.6.0, < 2.6.1
        TensorFlow version >= 2.5.0, < 2.5.2
        TensorFlow version < 2.4.4

Exploitation Mechanism

Attackers can exploit this vulnerability by supplying negative arguments to the

SplitV
function in TensorFlow.

Mitigation and Prevention

To address CVE-2021-41222, consider the following steps:

Immediate Steps to Take

        Update TensorFlow to version 2.7.0 when available.
        Apply provided patches for TensorFlow versions 2.6.1, 2.5.2, and 2.4.4.

Long-Term Security Practices

        Regularly update TensorFlow to the latest versions to mitigate known vulnerabilities.

Patching and Updates

        Keep TensorFlow installations up to date with the latest security patches and bug fixes.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now