製品・ソフトウェアに関する情報
TensorFlow における整数オーバーフローの脆弱性
Title TensorFlow における整数オーバーフローの脆弱性
Summary

TensorFlow には、整数オーバーフローの脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date April 21, 2021, midnight
Registration Date Jan. 21, 2022, 5:52 p.m.
Last Update Jan. 21, 2022, 5:52 p.m.
CVSS3.0 : 警告
Score 5.5
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS2.0 : 注意
Score 2.1
Vector AV:L/AC:L/Au:N/C:N/I:N/A:P
Affected System
Google
Google TensorFlow 2.5.0 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2022年01月21日]
  掲載
Jan. 21, 2022, 5:52 p.m.

NVD Vulnerability Information
CVE-2021-29523
Summary

TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/kernels/sparse_tensors_map_ops.cc#L257) takes the values specified in `sparse_shape` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Publication Date May 15, 2021, 5:15 a.m.
Registration Date May 15, 2021, 10 a.m.
Last Update May 21, 2021, 2:06 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.1.4
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.2.0 2.2.3
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.3.0 2.3.3
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.4.0 2.4.2
Related information, measures and tools
Common Vulnerabilities List