First published: Wed Jun 30 2021(Updated: )
** DISPUTED ** TensorFlow through 2.5.0 allows attackers to overwrite arbitrary files via a crafted archive when tf.keras.utils.get_file is used with extract=True. NOTE: the vendor's position is that tf.keras.utils.get_file is not intended for untrusted archives.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <=2.5.0 | |
<=2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35958 is classified as a moderate severity vulnerability due to the potential for arbitrary file overwrites.
To mitigate CVE-2021-35958, avoid using the tf.keras.utils.get_file method with extract=True on untrusted archives.
CVE-2021-35958 affects versions of TensorFlow from 0.1.0 up to and including 2.5.0.
CVE-2021-35958 itself does not directly lead to remote code execution, but can allow an attacker to overwrite arbitrary files on the system.
The recommended workaround for CVE-2021-35958 is to validate and sanitize all inputs to tf.keras.utils.get_file before extraction.