STT-tensorflow/tensorflow/security/advisory/tfsa-2018-005.md
TensorFlower Gardener d1c859c4ef Merge pull request #45951 from yqtianust:patch-1
PiperOrigin-RevId: 349303640
Change-Id: I6c091ff8e7605f93839519a60eb69082aca37089
2020-12-28 10:58:05 -08:00

1.1 KiB

TFSA-2018-005: Old Snappy Library Usage Resulting in Memcpy Parameter Overlap

CVE Number

CVE-2018-7577

Issue Description

TensorFlow checkpoint meta file uses Google's snappy compression/decompression library. There is a memcpy-param-overlap issue in the version of snappy currently used by TensorFlow.

Impact

A maliciously crafted checkpoint meta file could cause TensorFlow to crash or read from other parts of its process memory.

Vulnerable Versions

TensorFlow 1.1.0, 1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.4.0, 1.4.1, 1.5.0, 1.5.1, 1.6.0, 1.7.0

Mitigation

We have patched the vulnerability in GitHub commit dfa9921e by upgrading the version of the snappy library used by TensorFlow to v1.1.7.

If users are loading untrusted checkpoints in TensorFlow, we encourage users to apply the patch to upgrade snappy.

Additionally, we have released TensorFlow version 1.7.1 to mitigate this vulnerability.

Credits

This issue was discovered by the Blade Team of Tencent.