aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
3347 items

CVE-2021-41212: TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged

highvulnerability
security
Nov 5, 2021
CVE-2021-41212

TensorFlow, an open source machine learning platform, has a vulnerability in its shape inference code for the `tf.ragged.cross` function that allows reading data outside the bounds of allocated memory (an out-of-bounds read, which can cause crashes or expose sensitive data). The vulnerability affects multiple versions of TensorFlow and has been patched in newer releases.

Fix: The fix is included in TensorFlow 2.7.0. For users on earlier versions, patches were also released for TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, which are still in the supported range.

NVD/CVE Database

CVE-2021-41211: TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `QuantizeV

highvulnerability
security
Nov 5, 2021
CVE-2021-41211

TensorFlow, an open-source machine learning platform, has a vulnerability in its shape inference code for the `QuantizeV2` function that allows reading memory outside of the intended boundaries (heap OOB read, or out-of-bounds read) when the `axis` parameter is given a negative value less than -1. This happens because the code doesn't properly validate that negative axis values stay within acceptable bounds before accessing memory.

CVE-2021-41205: TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `

highvulnerability
security
Nov 5, 2021
CVE-2021-41205

TensorFlow, an open source platform for machine learning, has a vulnerability in its shape inference functions for `QuantizeAndDequantizeV*` operations that can cause the program to read data outside the bounds of allocated memory (an out-of-bounds read, which is a memory safety error). This affects multiple versions of TensorFlow.

CVE-2021-41204: TensorFlow is an open source platform for machine learning. In affected versions during TensorFlow's Grappler optimizer

mediumvulnerability
security
Nov 5, 2021
CVE-2021-41204

TensorFlow, an open source machine learning platform, has a bug in its Grappler optimizer (the part that optimizes computational graphs) where constant folding (simplifying calculations before running them) incorrectly tries to copy resource tensors (special data structures that shouldn't be modified), causing the program to crash. The issue affects multiple versions of TensorFlow.

CVE-2021-41203: TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behav

highvulnerability
security
Nov 5, 2021
CVE-2021-41203

TensorFlow, an open-source machine learning platform, has a vulnerability where attackers can cause crashes or undefined behavior (unpredictable program execution) by modifying saved checkpoints (saved states of a trained model) from outside the system, because the checkpoint loading code doesn't properly validate file formats. This affects multiple versions of TensorFlow that are still being supported.

CVE-2021-41210: TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for `Spar

highvulnerability
security
Nov 5, 2021
CVE-2021-41210

TensorFlow, an open source machine learning platform, had a vulnerability in its shape inference functions for `SparseCountSparseOutput` that could cause an out-of-bounds read (accessing memory outside the intended area of a heap-allocated array, which can crash the program or leak data). This vulnerability affected multiple versions of TensorFlow.

CVE-2021-41201: TensorFlow is an open source platform for machine learning. In affeced versions during execution, `EinsumHelper::ParseEq

highvulnerability
security
Nov 5, 2021
CVE-2021-41201

TensorFlow, an open source machine learning platform, has a bug in the `EinsumHelper::ParseEquation()` function where it fails to properly initialize certain flags (variables that track whether ellipsis notation is used in inputs and outputs). The function only sets these flags to true but never to false, which can cause the program to read uninitialized memory (garbage values) if code calling this function assumes the flags are always set correctly.

CVE-2021-41200: TensorFlow is an open source platform for machine learning. In affected versions if `tf.summary.create_file_writer` is c

mediumvulnerability
security
Nov 5, 2021
CVE-2021-41200

TensorFlow (an open source platform for machine learning) has a bug where calling a specific function called `tf.summary.create_file_writer` with non-scalar arguments (values that aren't single numbers) causes the program to crash due to a failed assertion check. This vulnerability affects several versions of TensorFlow.

CVE-2021-41199: TensorFlow is an open source platform for machine learning. In affected versions if `tf.image.resize` is called with a l

mediumvulnerability
security
Nov 5, 2021
CVE-2021-41199

TensorFlow (an open source machine learning platform) has a bug in its `tf.image.resize` function where using very large input values causes the program to crash due to an integer overflow (when a number becomes too large for its storage type). The overflow is caught by a safety check that stops the entire process.

CVE-2021-41198: TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large inp

mediumvulnerability
security
Nov 5, 2021
CVE-2021-41198

TensorFlow (an open source machine learning platform) crashes when the `tf.tile` function (which repeats tensor data) is called with very large inputs, because the number of output elements exceeds what an `int64_t` integer type can hold, causing an overflow that triggers a safety check and terminates the process.

CVE-2021-41197: TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a larg

mediumvulnerability
security
Nov 5, 2021
CVE-2021-41197

TensorFlow (an open source machine learning platform) has a vulnerability where tensors (multi-dimensional arrays of numbers) with very large dimensions can cause an integer overflow (when a calculation produces a number too big to store), resulting in a crash or inconsistent behavior. The vulnerability occurs because the code checks for overflow incorrectly in some parts of the codebase.

CVE-2021-41196: TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a

mediumvulnerability
security
Nov 5, 2021
CVE-2021-41196

TensorFlow (an open source machine learning platform) has a bug in its Keras pooling layers (functions that reduce data size by sampling from groups of values) that can cause a segfault (crash where the program tries to access invalid memory) if the pool size is 0 or if a dimension is negative, because the code doesn't check that these values are positive.

CVE-2021-41195: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `tf.math.segment_

mediumvulnerability
security
Nov 5, 2021
CVE-2021-41195

TensorFlow's `tf.math.segment_*` operations (functions that process data divided into segments) crash with a denial of service error when a segment ID is very large, because the code doesn't properly handle cases where the output size exceeds what an int64_t (a 64-bit integer type) can store. The crash happens in both CPU and GPU implementations when computing output shape.

CVE-2021-42694: An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows

highvulnerability
security
Nov 1, 2021
CVE-2021-42694

CVE-2021-42694 is a vulnerability in the Unicode Specification (up to version 14.0) that allows attackers to create source code identifiers (like function names) using homoglyphs (characters that look identical but are technically different) to sneak malicious code into software. An attacker could use these visually identical but distinct characters in upstream dependencies (external code libraries), and developers reviewing the code might not catch the deception, allowing the malicious code to be used downstream (in other software that depends on it).

CVE-2021-41127: Rasa is an open source machine learning framework to automate text-and voice-based conversations. In affected versions a

highvulnerability
security
Oct 21, 2021
CVE-2021-41127

Rasa is a framework for building conversational AI systems, and versions before 2.8.10 have a vulnerability where a malicious model file (a compressed archive containing trained AI weights) can overwrite or replace important bot files. This happens because the software doesn't properly validate what's inside the model file before extracting it.

CVE-2021-35617: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Coherence Container). Suppor

criticalvulnerability
security
Oct 20, 2021
CVE-2021-35617

A serious vulnerability (CVE-2021-35617) exists in Oracle WebLogic Server's Coherence Container component that allows attackers without authentication to take over the server by sending specially crafted messages over IIOP (a network protocol for distributed systems). The flaw affects versions 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0 and has a CVSS score (severity rating) of 9.8 out of 10, indicating it severely impacts security.

Offensive BPF: Understanding and using bpf_probe_write_user

infonews
security
Oct 20, 2021

This post explores how BPF (Berkeley Packet Filter, a technology that allows running custom programs inside the Linux kernel) can be used offensively, specifically focusing on the bpf_probe_write_user function (a helper that lets BPF programs modify user-space data during execution). The author documents their process of learning to write advanced BPF programs in C using libbpf to manipulate filenames, hide directories, and simulate ransomware attacks while also considering detection methods.

Offensive BPF: Sniffing Firefox traffic with bpftrace

infonews
security
Oct 14, 2021

This post describes how to use bpftrace (a tool for tracing system behavior) with uprobes (hooks into user-space functions) to intercept and read Firefox's encrypted traffic by hooking into the NSS library (Mozilla's Network Security Services, which Firefox uses for encryption). The author discovered that Firefox uses local NSS libraries rather than system-wide encryption libraries, and created a bpftrace script that hooks the PR_Write function to capture and display the data Firefox sends.

Video: Understanding Image Scaling Attacks

infonews
securityresearch

Video: What is Tabnabbing?

infonews
security
Oct 10, 2021

Tabnabbing is a web application security vulnerability that attackers can use to perform phishing attacks (tricking users into giving up sensitive information by impersonating legitimate websites). The video explains how tabnabbing works and how to defend against it, and notes that the vulnerability is relatively straightforward to prevent.

Previous142 / 168Next

Fix: The fix will be included in TensorFlow 2.7.0. The fix will also be applied to TensorFlow 2.6.1, as this is the only other version affected.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.7.0. The patch will also be applied to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these versions are affected and still supported.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.7.0. Updates will also be available in TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database

Fix: The fixes will be included in TensorFlow 2.7.0. Additionally, patches will be cherry-picked (applied) to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, which are also affected and still in the supported range.

NVD/CVE Database

Fix: The fix is included in TensorFlow 2.7.0. The patch was also cherry-picked (applied to earlier versions) for TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, which were still in the supported range at the time.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.7.0. The fix will also be backported (cherry-picked) to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.7.0. The developers will also apply this fix to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, which are still in the supported range. Users can reference the patch commit at https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.7.0. The fix will also be backported to TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database

Fix: The fix is included in TensorFlow 2.7.0. The patch will also be backported (applied to older versions) in TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.7.0. Users of affected versions should update to TensorFlow 2.7.0, or apply cherrypicked patches available for TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4.

NVD/CVE Database

Fix: Update to TensorFlow 2.7.0, or apply the fix via cherrypicked commits in TensorFlow 2.6.1, TensorFlow 2.5.2, or TensorFlow 2.4.4.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.7.0. TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4 will also receive this patch as these versions are still supported.

NVD/CVE Database

Fix: The Unicode Consortium provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms, and has documented this security vulnerability in Unicode Technical Report #36, Unicode Security Considerations.

NVD/CVE Database

Fix: The vulnerability is fixed in Rasa 2.8.10. For users unable to update, ensure that users do not upload untrusted model files, and restrict CLI (command-line interface, a text-based way to control software) or API endpoint access (network connections that allow external programs to interact with Rasa) where a malicious actor could target a deployed Rasa instance.

NVD/CVE Database
NVD/CVE Database
Embrace The Red
Embrace The Red
Oct 12, 2021

Adversaries can hide a smaller image within a larger one so that it becomes visible when a computer resizes the image using insecure interpolation (a method of calculating pixel values between known points). The video demonstrates this attack technique and explains how to prevent it from happening.

Fix: The source mentions that mitigation is discussed in the video but does not explicitly state the mitigation steps in the text provided. N/A -- no specific mitigation described in source.

Embrace The Red
Embrace The Red