Vulnerability Name: | CVE-2021-29557 (CCN-201941) | ||||||||||||
Assigned: | 2021-05-12 | ||||||||||||
Published: | 2021-05-12 | ||||||||||||
Updated: | 2021-05-18 | ||||||||||||
Summary: | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`. The division by 0 occurs deep in Eigen code because the `b` tensor is empty. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
2.2 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-369 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29557 Source: XF Type: UNKNOWN tensorflow-cve202129557-dos(201941) Source: MISC Type: Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5 Source: CCN Type: TensorFlow GIT Repository Division by 0 in SparseMatMul Source: CONFIRM Type: Exploit, Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh Source: CCN Type: IBM Security Bulletin 6486007 (Watson Machine Learning on CP4D) Multiple TensorFlow Vulnerabilities Affect IBM Watson Machine Learning on CP4D | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |