VYPR
Moderate severityNVD Advisory· Published May 14, 2021· Updated Aug 3, 2024

Integer overflow in TFLite concatentation

CVE-2021-29601

Description

TensorFlow is an end-to-end open source platform for machine learning. The TFLite implementation of concatenation is vulnerable to an integer overflow issue(https://github.com/tensorflow/tensorflow/blob/7b7352a724b690b11bfaae2cd54bc3907daf6285/tensorflow/lite/kernels/concatenation.cc#L70-L76). An attacker can craft a model such that the dimensions of one of the concatenation input overflow the values of int. TFLite uses int to represent tensor dimensions, whereas TF uses int64. Hence, valid TF models can trigger an integer overflow when converted to TFLite format. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tensorflowPyPI
< 2.1.42.1.4
tensorflowPyPI
>= 2.2.0, < 2.2.32.2.3
tensorflowPyPI
>= 2.3.0, < 2.3.32.3.3
tensorflowPyPI
>= 2.4.0, < 2.4.22.4.2
tensorflow-cpuPyPI
< 2.1.42.1.4
tensorflow-cpuPyPI
>= 2.2.0, < 2.2.32.2.3
tensorflow-cpuPyPI
>= 2.3.0, < 2.3.32.3.3
tensorflow-cpuPyPI
>= 2.4.0, < 2.4.22.4.2
tensorflow-gpuPyPI
< 2.1.42.1.4
tensorflow-gpuPyPI
>= 2.2.0, < 2.2.32.2.3
tensorflow-gpuPyPI
>= 2.3.0, < 2.3.32.3.3
tensorflow-gpuPyPI
>= 2.4.0, < 2.4.22.4.2

Affected products

1

Patches

1
4253f96a5848

Fix integer overflow in TFLite concat

https://github.com/tensorflow/tensorflowMihai MaruseacApr 28, 2021via ghsa
1 file changed · +6 0
  • tensorflow/lite/kernels/concatenation.cc+6 0 modified
    @@ -16,6 +16,8 @@ limitations under the License.
     
     #include <stdint.h>
     
    +#include <limits>
    +
     #include "tensorflow/lite/c/builtin_op_data.h"
     #include "tensorflow/lite/c/common.h"
     #include "tensorflow/lite/kernels/internal/compatibility.h"
    @@ -69,6 +71,10 @@ TfLiteStatus Prepare(TfLiteContext* context, TfLiteNode* node) {
         TF_LITE_ENSURE_EQ(context, t->type, input_type);
         for (int d = 0; d < t0->dims->size; ++d) {
           if (d == axis) {
    +        // Avoid integer overflow in sum_axis below
    +        TF_LITE_ENSURE(context, t->dims->data[axis] >= 0);
    +        TF_LITE_ENSURE(context, t->dims->data[axis] <=
    +                                    std::numeric_limits<int>::max() - sum_axis);
             sum_axis += t->dims->data[axis];
           } else {
             TF_LITE_ENSURE_EQ(context, t->dims->data[d], t0->dims->data[d]);
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.