This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tensorflow | pip | >= 2.4.0rc0, < 2.4.0 | 2.4.0 |
| tensorflow-cpu | pip | >= 2.4.0rc0, < 2.4.0 | 2.4.0 |
| tensorflow-gpu | pip | >= 2.4.0rc0, < 2.4.0 | 2.4.0 |
The vulnerability stems from the parallel BFS implementation in GetMatchingPaths where dir_index was incremented outside the lambda scope. The code accessed dirs[dir_index] after this increment without validating array bounds. The commit 8b5b9dc completely rewrote this function to fix the issue, confirming it was the root cause. The Match() call in the lambda used the unchecked dir_index to access the dirs array, leading to heap OOB reads when directory structures triggered index overflows.
KEV Misses 88% of Exploited CVEs- Get the report