VYPR
Moderate severityNVD Advisory· Published May 14, 2021· Updated Aug 3, 2024

Incomplete validation in `SparseAdd`

CVE-2021-29609

Description

TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in SparseAdd results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of *_indices matches the size of corresponding *_shape. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tensorflowPyPI
< 2.1.42.1.4
tensorflowPyPI
>= 2.2.0, < 2.2.32.2.3
tensorflowPyPI
>= 2.3.0, < 2.3.32.3.3
tensorflowPyPI
>= 2.4.0, < 2.4.22.4.2
tensorflow-cpuPyPI
< 2.1.42.1.4
tensorflow-cpuPyPI
>= 2.2.0, < 2.2.32.2.3
tensorflow-cpuPyPI
>= 2.3.0, < 2.3.32.3.3
tensorflow-cpuPyPI
>= 2.4.0, < 2.4.22.4.2
tensorflow-gpuPyPI
< 2.1.42.1.4
tensorflow-gpuPyPI
>= 2.2.0, < 2.2.32.2.3
tensorflow-gpuPyPI
>= 2.3.0, < 2.3.32.3.3
tensorflow-gpuPyPI
>= 2.4.0, < 2.4.22.4.2

Affected products

1

Patches

2
41727ff06111

Validate that a and b are proper sparse tensors

https://github.com/tensorflow/tensorflowMihai MaruseacMay 11, 2021via ghsa
1 file changed · +12 5
  • tensorflow/core/kernels/sparse_add_op.cc+12 5 modified
    @@ -44,6 +44,11 @@ class SparseAddOp : public OpKernel {
                         b_indices->shape().DebugString()));
         const int64 a_nnz = a_indices->dim_size(0);
         const int64 b_nnz = b_indices->dim_size(0);
    +    const int num_dims = a_indices->dim_size(1);
    +    OP_REQUIRES(ctx, b_indices->dim_size(1) == num_dims,
    +                errors::InvalidArgument(
    +                    "Input indices must have the same dimension, got ",
    +                    num_dims, " and ", b_indices->dim_size(1)));
     
         OP_REQUIRES_OK(ctx, ctx->input("a_values", &a_values_t));
         OP_REQUIRES_OK(ctx, ctx->input("b_values", &b_values_t));
    @@ -72,6 +77,13 @@ class SparseAddOp : public OpKernel {
                         "Input shapes should be a vector but received shapes ",
                         a_shape->shape().DebugString(), " and ",
                         b_shape->shape().DebugString()));
    +    OP_REQUIRES(
    +        ctx, a_shape->NumElements() == num_dims,
    +        errors::InvalidArgument("Second dimension of a_indices and length of "
    +                                "a_shape must match, got ",
    +                                num_dims, " and ", a_shape->NumElements()));
    +    OP_REQUIRES(ctx, num_dims > 0,
    +                errors::InvalidArgument("Tesors must not be empty"));
         OP_REQUIRES(
             ctx, a_shape->IsSameSize(*b_shape),
             errors::InvalidArgument(
    @@ -100,11 +112,6 @@ class SparseAddOp : public OpKernel {
         std::vector<std::pair<bool, int64>> entries_to_copy;  // from_a?, idx
         entries_to_copy.reserve(a_nnz + b_nnz);
         std::vector<T> out_values;
    -    const int num_dims = a_shape->dim_size(0);
    -
    -    OP_REQUIRES(ctx, num_dims > 0,
    -                errors::InvalidArgument("Invalid input_a shape. Received: ",
    -                                        a_shape->DebugString()));
     
         // The input and output sparse tensors are assumed to be ordered along
         // increasing dimension number.
    
6fd02f448107

Fix `tf.raw_ops.SparseAdd ` invalid memory access failure.

https://github.com/tensorflow/tensorflowAmit PatankarApr 26, 2021via ghsa
1 file changed · +5 0
  • tensorflow/core/kernels/sparse_add_op.cc+5 0 modified
    @@ -14,6 +14,7 @@ limitations under the License.
     ==============================================================================*/
     
     #include "tensorflow/core/framework/op_kernel.h"
    +#include "tensorflow/core/framework/op_requires.h"
     #include "tensorflow/core/framework/register_types.h"
     #include "tensorflow/core/framework/tensor.h"
     #include "tensorflow/core/framework/tensor_util.h"
    @@ -101,6 +102,10 @@ class SparseAddOp : public OpKernel {
         std::vector<T> out_values;
         const int num_dims = a_shape->dim_size(0);
     
    +    OP_REQUIRES(ctx, num_dims > 0,
    +                errors::InvalidArgument("Invalid input_a shape. Received: ",
    +                                        a_shape->DebugString()));
    +
         // The input and output sparse tensors are assumed to be ordered along
         // increasing dimension number.
         int64 i = 0, j = 0;
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.