Vulnerability Name: | CVE-2021-29593 (CCN-201899) | ||||||||||||
Assigned: | 2021-05-12 | ||||||||||||
Published: | 2021-05-12 | ||||||||||||
Updated: | 2021-05-19 | ||||||||||||
Summary: | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
2.2 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-369 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29593 Source: XF Type: UNKNOWN tensorflow-cve202129593-dos(201899) Source: MISC Type: Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044 Source: CCN Type: TensorFlow GIT Repository Division by zero in TFLite's implementation of BatchToSpaceNd Source: CONFIRM Type: Exploit, Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h Source: CCN Type: IBM Security Bulletin 6486007 (Watson Machine Learning on CP4D) Multiple TensorFlow Vulnerabilities Affect IBM Watson Machine Learning on CP4D | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |