Vulnerability Name: | CVE-2021-29528 (CCN-202037) | ||||||||||||
Assigned: | 2021-05-12 | ||||||||||||
Published: | 2021-05-12 | ||||||||||||
Updated: | 2021-05-20 | ||||||||||||
Summary: | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55900e961ed4a23b438392024912154a2c2f5e85/tensorflow/core/kernels/quantized_mul_op.cc#L188-L198) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
2.7 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-369 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29528 Source: XF Type: UNKNOWN tensorflow-cve202129528-dos(202037) Source: MISC Type: Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6 Source: CCN Type: TensorFlow GIT Repository Division by 0 in QuantizedMul Source: CONFIRM Type: Exploit, Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp Source: CCN Type: IBM Security Bulletin 6486005 (Watson Machine Learning on CP4D) Multiple TensorFlow Vulnerabilities Affect IBM Watson Machine Learning on CP4D | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |