CVE-2021-41213
05.11.2021, 23:15
TensorFlow is an open source platform for machine learning. In affected versions the code behind `tf.function` API can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive. This occurs due to using a non-reentrant `Lock` Python object. Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.Enginsight
Vendor | Product | Version |
---|---|---|
tensorflow | 2.4.0 ≤ 𝑥 < 2.4.4 | |
tensorflow | 2.5.0 ≤ 𝑥 < 2.5.2 | |
tensorflow | 2.6.0 ≤ 𝑥 < 2.6.1 | |
tensorflow | 2.7.0:rc0 | |
tensorflow | 2.7.0:rc1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-667 - Improper LockingThe software does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
- CWE-662 - Improper SynchronizationThe software utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.
References