TensorFlow における整数オーバーフローの脆弱性
Title |
TensorFlow における整数オーバーフローの脆弱性 |
Summary |
TensorFlow には、整数オーバーフローの脆弱性が存在します。
|
Possible impacts |
サービス運用妨害 (DoS) 状態にされる可能性があります。 |
Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
Publication Date |
April 21, 2021, midnight |
Registration Date |
Jan. 21, 2022, 5:52 p.m. |
Last Update |
Jan. 21, 2022, 5:52 p.m. |
CVSS3.0 : 警告
|
Score |
5.5
|
Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVSS2.0 : 注意
|
Score |
2.1
|
Vector |
AV:L/AC:L/Au:N/C:N/I:N/A:P |
Affected System
Google |
Google TensorFlow 2.5.0 未満
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No |
Changed Details |
Date of change |
1 |
[2022年01月21日] 掲載 |
Jan. 21, 2022, 5:52 p.m. |
NVD Vulnerability Information
CVE-2021-29523
Summary |
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/kernels/sparse_tensors_map_ops.cc#L257) takes the values specified in `sparse_shape` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
Publication Date |
May 15, 2021, 5:15 a.m. |
Registration Date |
May 15, 2021, 10 a.m. |
Last Update |
May 21, 2021, 2:06 a.m. |
Affected software configurations
Configuration1 |
or higher |
or less |
more than |
less than |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
|
|
|
2.1.4 |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
2.2.0 |
|
|
2.2.3 |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
2.3.0 |
|
|
2.3.3 |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
2.4.0 |
|
|
2.4.2 |
Related information, measures and tools
Common Vulnerabilities List