Vulnerability Name: | CVE-2021-29618 (CCN-201868) | ||||||||||||
Assigned: | 2021-05-12 | ||||||||||||
Published: | 2021-05-12 | ||||||||||||
Updated: | 2021-07-27 | ||||||||||||
Summary: | TensorFlow is an end-to-end open source platform for machine learning. Passing a complex argument to `tf.transpose` at the same time as passing `conjugate=True` argument results in a crash. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
2.2 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-755 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29618 Source: XF Type: UNKNOWN tensorflow-cve202129618-dos(201868) Source: MISC Type: Broken Link https://github.com/tensorflow/issues/42105 Source: MISC Type: Broken Link https://github.com/tensorflow/issues/46973 Source: MISC Type: Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88 Source: CCN Type: TensorFlow GIT Repository Crash in tf.transpose with complex inputs Source: CONFIRM Type: Exploit, Patch, Third Party Advisory https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w Source: CCN Type: IBM Security Bulletin 6486007 (Watson Machine Learning on CP4D) Multiple TensorFlow Vulnerabilities Affect IBM Watson Machine Learning on CP4D | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |